INFO: task kworker/0:0:9 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df83dd84 r8:00000002 r7:60000113 r6:df83dd8c r5:8323e000 r4:8323e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8323e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dd86c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8323e000 r7:00000000 r6:83018000 r5:00001000 r4:7f2a7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb0d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85937f8c r4:85937c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85937f8c r4:830b8400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323e000 r8:830b842c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027ecf4 r7:df819e48 r6:830b8480 r5:8323e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:830b7180 INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/1:1:47 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:47 tgid:47 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df921d84 r8:00000002 r7:60000113 r6:df921d8c r5:833abc00 r4:833abc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833abc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df921e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:833abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e578c r4:851e5400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e578c r4:832a1200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833abc00 r8:832a122c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832a1200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1200 r8:8027ecf4 r7:df879e60 r6:8336bd80 r5:833abc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf921fb0 to 0xdf921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:832a2280 INFO: task kworker/1:1:47 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/1:2:725 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:725 tgid:725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e03b5d84 r8:00000002 r7:60000113 r6:e03b5d8c r5:83ac6000 r4:83ac6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03b5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85229680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ac6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855d9b8c r4:855d9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855d9b8c r4:8387f900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac6000 r8:8387f92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8387f900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8387f900 r8:8027ecf4 r7:df879e60 r6:8387ff00 r5:83ac6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe03b5fb0 to 0xe03b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:83bed440 INFO: task kworker/1:2:725 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/1:0:3116 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3116 tgid:3116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df951d84 r8:00000002 r7:60000013 r6:df951d8c r5:841ab000 r4:841ab000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841ab000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df951e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e07e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:841ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c0cf8c r4:84c0cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84c0cf8c r4:845bde00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841ab000 r8:845bde2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bde00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bde00 r8:8027ecf4 r7:e03b5e60 r6:845bde80 r5:841ab000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf951fb0 to 0xdf951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:830b7a00 INFO: task kworker/1:0:3116 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/1:3:3122 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df989d84 r8:00000002 r7:60000113 r6:df989d8c r5:841a9800 r4:841a9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841a9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df989e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85002100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:841a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855d8f8c r4:855d8c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855d8f8c r4:845bdf00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841a9800 r8:845bdf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bdf00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bdf00 r8:8027ecf4 r7:e03b5e60 r6:845bdf80 r5:841a9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf989fb0 to 0xdf989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db51c0 INFO: task kworker/1:3:3122 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/0:9:3135 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:83ac4800 r4:83ac4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e004c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ac4800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0649000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503bf8c r4:8503bc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503bf8c r4:84489d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac4800 r8:84489d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84489d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84489d00 r8:8027ecf4 r7:df9dde60 r6:830b8600 r5:83ac4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db6a80 INFO: task kworker/0:9:3135 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/0:10:3137 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9f1d84 r8:00000002 r7:60000113 r6:df9f1d8c r5:840c9800 r4:840c9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:840c9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84520800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0641000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fc78c r4:847fc400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:847fc78c r4:830b8500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840c9800 r8:830b852c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8500 r8:8027ecf4 r7:df9d5e60 r6:84161700 r5:840c9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db6a80 INFO: task kworker/0:10:3137 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/0:11:3139 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa01d84 r8:00000002 r7:60000113 r6:dfa01d8c r5:840c8000 r4:840c8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:840c8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa01e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510a5c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff45000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847fff8c r4:847ffc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:847fff8c r4:832a1080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840c8000 r8:832a10ac r7:82804d40 r6:dddced40 r5:dddced60 r4:832a1080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1080 r8:8027ecf4 r7:df9f1e60 r6:832a1000 r5:840c8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa01fb0 to 0xdfa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db6f80 INFO: task kworker/0:11:3139 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/0:12:3142 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa09d84 r8:00000002 r7:60000113 r6:dfa09d8c r5:838a6c00 r4:838a6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838a6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521b640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab9d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851dbf8c r4:851dbc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851dbf8c r4:832a1300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838a6c00 r8:832a132c r7:82804d40 r6:dddced40 r5:dddced60 r4:832a1300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1300 r8:8027ecf4 r7:df9f1e60 r6:845bdd80 r5:838a6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa09fb0 to 0xdfa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2100 INFO: task kworker/0:12:3142 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/0:13:3143 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9e5d84 r8:00000002 r7:60000113 r6:df9e5d8c r5:840ca400 r4:840ca400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:840ca400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84518440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea985000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506cf8c r4:8506cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506cf8c r4:832a1280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840ca400 r8:832a12ac r7:82804d40 r6:dddced40 r5:dddced60 r4:832a1280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1280 r8:8027ecf4 r7:dfa09e60 r6:832a1680 r5:840ca400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2340 INFO: task kworker/0:13:3143 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3145 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa15d84 r8:00000002 r7:60000113 r6:dfa15d8c r5:840ce000 r4:840ce000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:840ce000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa15e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d90000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506f78c r4:8506f400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506f78c r4:832a1c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840ce000 r8:832a1c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:832a1c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1c00 r8:8027ecf4 r7:dfa09e60 r6:832a1600 r5:840ce000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa15fb0 to 0xdfa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd21c0 INFO: task kworker/0:14:3145 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3148 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:840cc800 r4:840cc800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:840cc800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d9fb00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88cf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c04b8c r4:84c04800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c04b8c r4:832a1b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840cc800 r8:832a1bac r7:82804d40 r6:dddced40 r5:dddced60 r4:832a1b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1b80 r8:8027ecf4 r7:dfa09e60 r6:8416fe00 r5:840cc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2500 INFO: task kworker/0:15:3148 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3149 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:83ac1800 r4:83ac1800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8459c440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ac1800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff15000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c05f8c r4:84c05c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c05f8c r4:844c1780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac1800 r8:844c17ac r7:82804d40 r6:dddced40 r5:dddced60 r4:844c1780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844c1780 r8:8027ecf4 r7:dfa09e60 r6:844a5b00 r5:83ac1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2600 INFO: task kworker/0:16:3149 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3151 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa39d84 r8:00000002 r7:60000113 r6:dfa39d8c r5:83a93c00 r4:83a93c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a93c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa39e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8456c140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a93c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85171b8c r4:85171800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85171b8c r4:844a5e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a93c00 r8:844a5e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:844a5e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844a5e00 r8:8027ecf4 r7:dfa29e60 r6:84e02000 r5:83a93c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa39fb0 to 0xdfa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2600 INFO: task kworker/0:17:3151 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3155 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:83aae000 r4:83aae000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aae000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8456c440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aae000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff91000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85171f8c r4:85171c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85171f8c r4:84e02080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aae000 r8:84e020ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02080 r8:8027ecf4 r7:dfa29e60 r6:84e02100 r5:83aae000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2bc0 INFO: task kworker/0:18:3155 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3157 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:83aaa400 r4:83aaa400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aaa400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8459c880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aaa400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabcf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c05b8c r4:84c05800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c05b8c r4:84e02200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aaa400 r8:84e0222c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02200 r8:8027ecf4 r7:dfa29e60 r6:84e02180 r5:83aaa400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2c40 INFO: task kworker/0:19:3157 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3159 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa61d84 r8:00000002 r7:60000113 r6:dfa61d8c r5:840cbc00 r4:840cbc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:840cbc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541ab80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0393000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c878c r4:852c8400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852c878c r4:84e02280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840cbc00 r8:84e022ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02280 r8:8027ecf4 r7:dfa29e60 r6:84e02300 r5:840cbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2d40 INFO: task kworker/0:20:3159 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3161 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa69d84 r8:00000002 r7:60000013 r6:dfa69d8c r5:8418d400 r4:8418d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8418d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85500200 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8418d400 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540a38c r4:8540a000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8540a38c r4:84e02380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8418d400 r8:84e023ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02380 r8:8027ecf4 r7:dfa61e60 r6:84e02400 r5:8418d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2fc0 INFO: task kworker/0:21:3161 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3163 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:8418e000 r4:8418e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8418e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546b8c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8418e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f7f8c r4:853f7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853f7f8c r4:84e02480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8418e000 r8:84e024ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02480 r8:8027ecf4 r7:dfa69e60 r6:84e02500 r5:8418e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07080 INFO: task kworker/0:22:3163 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3164 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa21d84 r8:00000002 r7:60000113 r6:dfa21d8c r5:832e8000 r4:832e8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832e8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546b300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c9b8c r4:852c9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852c9b8c r4:84e02580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832e8000 r8:84e025ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02580 r8:8027ecf4 r7:dfa69e60 r6:84e02600 r5:832e8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07300 INFO: task kworker/0:23:3164 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3166 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:832e9800 r4:832e9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832e9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502c040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852caf8c r4:852cac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852caf8c r4:84e02680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832e9800 r8:84e026ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02680 r8:8027ecf4 r7:dfa69e60 r6:84e02700 r5:832e9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa7dfb0 to 0xdfa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07180 INFO: task kworker/0:24:3166 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3169 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:832ebc00 r4:832ebc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832ebc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552b8c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa93000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d5b8c r4:854d5800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d5b8c r4:84e02780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832ebc00 r8:84e027ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02780 r8:8027ecf4 r7:dfa7de60 r6:84e02800 r5:832ebc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07480 INFO: task kworker/0:25:3169 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3170 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfaa5d84 r8:00000002 r7:60000013 r6:dfaa5d8c r5:841ae000 r4:841ae000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841ae000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845890c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:841ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5ef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d678c r4:854d6400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d678c r4:84e02880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841ae000 r8:84e028ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02880 r8:8027ecf4 r7:dfa89e60 r6:845bdc80 r5:841ae000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07480 INFO: task kworker/0:26:3170 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3173 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:838a4800 r4:838a4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838a4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84567340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9a5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85703f8c r4:85703c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85703f8c r4:84e02900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838a4800 r8:84e0292c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02900 r8:8027ecf4 r7:dfa89e60 r6:845bdb00 r5:838a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07800 INFO: task kworker/0:27:3173 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3174 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfac1d84 r8:00000002 r7:60000113 r6:dfac1d8c r5:8324a400 r4:8324a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8324a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523df00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8324a400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d738c r4:854d7000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d738c r4:84e02980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:84e029ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02980 r8:8027ecf4 r7:dfab9e60 r6:845bdb80 r5:8324a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac1fb0 to 0xdfac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07800 INFO: task kworker/0:28:3174 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3176 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfad1d84 r8:00000002 r7:60000013 r6:dfad1d8c r5:83fb6c00 r4:83fb6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83fb6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85255f80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83fb6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaab000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c0c38c r4:84c0c000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c0c38c r4:84e02a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fb6c00 r8:84e02a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02a00 r8:8027ecf4 r7:dfab9e60 r6:845bdc00 r5:83fb6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07840 INFO: task kworker/0:29:3176 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3179 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa9dd84 r8:00000002 r7:60000113 r6:dfa9dd8c r5:83fb6000 r4:83fb6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83fb6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa9de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85477bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83fb6000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb521000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566d78c r4:8566d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8566d78c r4:84e02a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fb6000 r8:84e02aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02a80 r8:8027ecf4 r7:dfab9e60 r6:845bda80 r5:83fb6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa9dfb0 to 0xdfa9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07b00 INFO: task kworker/0:30:3179 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:4:3181 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfac5d84 r8:00000002 r7:60000013 r6:dfac5d8c r5:83fb4800 r4:83fb4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83fb4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85233800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83fb4800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb003000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566c78c r4:8566c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566c78c r4:845bda00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fb4800 r8:845bda2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bda00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bda00 r8:8027ecf4 r7:e03b5e60 r6:845bd980 r5:83fb4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac5fb0 to 0xdfac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca00c0 INFO: task kworker/1:4:3181 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:5:3183 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:841abc00 r4:841abc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841abc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845364c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:841abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb84b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c4f8c r4:856c4c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c4f8c r4:845bd900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841abc00 r8:845bd92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bd900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bd900 r8:8027ecf4 r7:dfac5e60 r6:845bd880 r5:841abc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca01c0 INFO: task kworker/1:5:3183 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3185 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfaf9d84 r8:00000002 r7:60000013 r6:dfaf9d8c r5:83ad6c00 r4:83ad6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551b380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ad6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae77000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856bfb8c r4:856bf800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856bfb8c r4:845bd800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad6c00 r8:845bd82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bd800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bd800 r8:8027ecf4 r7:dfae5e60 r6:845bd780 r5:83ad6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca0340 INFO: task kworker/1:6:3185 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3187 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb01d84 r8:00000002 r7:60000013 r6:dfb01d8c r5:83fb0000 r4:83fb0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83fb0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ded2c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83fb0000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb739000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566e38c r4:8566e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8566e38c r4:84e02b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fb0000 r8:84e02bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02b80 r8:8027ecf4 r7:dfab9e60 r6:845bd700 r5:83fb0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb01fb0 to 0xdfb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07d00 INFO: task kworker/0:31:3187 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3188 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:83ad2400 r4:83ad2400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85113f00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ad2400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb779000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570378c r4:85703400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8570378c r4:84e02c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad2400 r8:84e02c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02c00 r8:8027ecf4 r7:dfab9e60 r6:845bd680 r5:83ad2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07e00 INFO: task kworker/0:32:3188 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3191 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:839cbc00 r4:839cbc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839cbc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84536300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:839cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6f5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c4b8c r4:856c4800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c4b8c r4:845bd600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839cbc00 r8:845bd62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bd600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bd600 r8:8027ecf4 r7:dfae5e60 r6:845bd480 r5:839cbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca07c0 INFO: task kworker/1:7:3191 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3192 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:839cec00 r4:839cec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839cec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84567f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:839cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85710b8c r4:85710800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85710b8c r4:84e02c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839cec00 r8:84e02cac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02c80 r8:8027ecf4 r7:dfab9e60 r6:845bd500 r5:839cec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca1000 INFO: task kworker/0:33:3192 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb31d84 r8:00000002 r7:60000013 r6:dfb31d8c r5:839cd400 r4:839cd400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839cd400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85250440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:839cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571178c r4:85711400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571178c r4:84e02d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839cd400 r8:84e02d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02d00 r8:8027ecf4 r7:dfb21e60 r6:845bd580 r5:839cd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca1140 INFO: task kworker/0:34:3194 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3196 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb3dd84 r8:00000002 r7:60000113 r6:dfb3dd8c r5:839c9800 r4:839c9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839c9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dd85c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:839c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f2a5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb07000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85937b8c r4:85937800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85937b8c r4:84e02d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839c9800 r8:84e02dac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02d80 r8:8027ecf4 r7:dfb31e60 r6:845bd400 r5:839c9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca1280 INFO: task kworker/0:35:3196 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3198 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:839c8c00 r4:839c8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839c8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8de00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:839c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f201000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec80f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc578c r4:85bc5400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc578c r4:84e02e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839c8c00 r8:84e02e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02e00 r8:8027ecf4 r7:dfb3de60 r6:845bd380 r5:839c8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca13c0 INFO: task kworker/0:36:3198 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3202 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb49d84 r8:00000002 r7:60000013 r6:dfb49d8c r5:839cb000 r4:839cb000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839cb000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84536440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:839cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb98f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c538c r4:856c5000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c538c r4:845bd300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839cb000 r8:845bd32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bd300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bd300 r8:8027ecf4 r7:dfae5e60 r6:845bd100 r5:839cb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca0800 INFO: task kworker/1:8:3202 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3203 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfaf1d84 r8:00000002 r7:60000113 r6:dfaf1d8c r5:839c8000 r4:839c8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:839c8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84536640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:839c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9bd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c578c r4:856c5400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c578c r4:845bd000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839c8000 r8:845bd02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bd000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bd000 r8:8027ecf4 r7:dfb49e60 r6:845bd080 r5:839c8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca0800 INFO: task kworker/1:9:3203 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3206 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb55d84 r8:00000002 r7:60000113 r6:dfb55d8c r5:83ad0c00 r4:83ad0c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad0c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb55e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84536740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ad0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba01000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c5b8c r4:856c5800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c5b8c r4:845bd200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad0c00 r8:845bd22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bd200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bd200 r8:8027ecf4 r7:dfaf1e60 r6:845bd280 r5:83ad0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb55fb0 to 0xdfb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cd3080 INFO: task kworker/1:10:3206 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3208 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:84cd8000 r4:84cd8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cd8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845365c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cd8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba2d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c5f8c r4:856c5c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c5f8c r4:845bd180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cd8000 r8:845bd1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845bd180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bd180 r8:8027ecf4 r7:dfb55e60 r6:843dfc00 r5:84cd8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cd3240 INFO: task kworker/1:11:3208 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3210 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb5dd84 r8:00000002 r7:60000113 r6:dfb5dd8c r5:84cd8c00 r4:84cd8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cd8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84536a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cd8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb0f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c678c r4:856c6400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c678c r4:830cd100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cd8c00 r8:830cd12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd100 r8:8027ecf4 r7:dfb59e60 r6:830cd080 r5:84cd8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb5dfb0 to 0xdfb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cd3180 INFO: task kworker/1:12:3210 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3212 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:84cd9800 r4:84cd9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cd9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845368c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cd9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c638c r4:856c6000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c638c r4:84ca6000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cd9800 r8:84ca602c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca6000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca6000 r8:8027ecf4 r7:dfb5de60 r6:84ca6080 r5:84cd9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cd3340 INFO: task kworker/1:13:3212 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3214 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:84cdb000 r4:84cdb000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cdb000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84536c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cdb000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c6f8c r4:856c6c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c6f8c r4:84ca6100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cdb000 r8:84ca612c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca6100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca6100 r8:8027ecf4 r7:dfb5de60 r6:84ca6180 r5:84cdb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cd3500 INFO: task kworker/1:14:3214 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3215 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:84cdc800 r4:84cdc800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cdc800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84536ec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cdc800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c7b8c r4:856c7800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c7b8c r4:84ca6200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cdc800 r8:84ca622c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca6200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca6200 r8:8027ecf4 r7:dfa91e60 r6:84ca6280 r5:84cdc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cd3700 INFO: task kworker/1:15:3215 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3218 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb7dd84 r8:00000002 r7:60000113 r6:dfb7dd8c r5:84cdbc00 r4:84cdbc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cdbc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84536cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cdbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbc7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c738c r4:856c7000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c738c r4:84ca6300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cdbc00 r8:84ca632c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca6300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca6300 r8:8027ecf4 r7:dfb69e60 r6:84ca6380 r5:84cdbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cd35c0 INFO: task kworker/1:16:3218 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3219 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:84cdd400 r4:84cdd400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cdd400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8dcc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cdd400 r7:00000000 r6:83018000 r5:00001000 r4:7f1ff000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec779000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc538c r4:85bc5000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc538c r4:84e02f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cdd400 r8:84e02f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e02f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e02f00 r8:8027ecf4 r7:dfb3de60 r6:84ca6400 r5:84cdd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca1dc0 INFO: task kworker/0:37:3219 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3221 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:84cda400 r4:84cda400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cda400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r4:8500f640 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:84098000 r4:84098000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84098000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dd82c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84098000 r7:00000000 r6:83018000 r5:00001000 r4:7f2a1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edaef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84e02e80 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84098c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08 r10:61c88647 r9:84098c00 r8:84ca65ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000000 r4:00000000 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3228 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84099800 r4:829189bc r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r4:e06c9dc0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:84ca6780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca6780 r8:8027ecf4 r7:dfb71e60 r6:84ca6800 r5:8409a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbadfb0 to 0xdfbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca2240 INFO: task kworker/1:19:3230 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8409b000 r5:8409b000 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: afb85000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 r5:00001000 r4:eda49000 r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:8409c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8409c800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) INFO: task kworker/1:21:3234 is blocked on a mutex likely owned by task kworker/0:73:3846. r4:00000000 r4:84ffea80 r4:8500f640 r5:832ee000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018205 r8:832ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c9b8c r4:856c9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c9b8c r4:84ca6a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832ee000 r8:84ca6aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca6a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca6a80 r8:8027ecf4 r7:dfbc1e60 r6:84d4d000 r5:832ee000 Exception stack(0xdfbddfb0 to 0xdfbddff8) r5:800f0013 r4:80239bb0 r5:00001000 r4:eda49000 r4:00000001 INFO: task kworker/1:23:3238 blocked for more than 451 seconds. r5:832fb000 r4:829189bc r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r5:832f9800 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3241 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfbf9d84 r8:00000002 r7:60000113 r6:dfbf9d8c r5:838b2400 r4:838b2400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838b2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06c9d20 to 0xe06c9d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 r4:84ffea80 r4:8500f640 r5:83fc3c00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c9f8c r4:856c9c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856c9f8c r4:84ca6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fc3c00 r8:84ca6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca6c80 r8:8027ecf4 r7:dfbf9e60 r6:84d4d200 r5:83fc3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 9d60: 800f0013 ffffffff [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:27:3246 blocked for more than 451 seconds. r5:83fc4800 r4:829189bc [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:e06c9dc0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08 r10:61c88647 r9:83fc6000 r8:84ca6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:85e2bb8c r4:85e2b800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:83fc3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc31e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83fc3000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7f9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cab8c r4:856ca800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856cab8c r4:84ca6e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fc3000 r8:84ca6e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca6e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca6e00 r8:8027ecf4 r7:dfc19e60 r6:84d4d380 r5:83fc3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc31fb0 to 0xdfc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r5:832f8c00 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9b80 9fa0: 00000000 00000000 00000000 00000000 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:31:3253 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3253 tgid:3253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc4dd84 r8:00000002 r7:60000013 r6:dfc4dd8c r5:83fc2400 r5:83fc2400 r4:829189bc [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r5:00001000 r4:eda49000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:845f0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551cf80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:845f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba7b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cbf8c r4:856cbc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856cbf8c r4:84e06000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:e06c9dc0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r5:845f0c00 r4:829189bc r9:83018005 r8:845f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2a9000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:33:3260 blocked for more than 451 seconds. r5:845f1800 r4:829189bc r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cbb8c r4:856cb800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856cbb8c r4:84e06080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845f1800 r8:84e060ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06080 r8:8027ecf4 r7:dfbb5e60 r6:84d4d680 r5:845f1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d48100 INFO: task kworker/1:33:3260 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3263 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3263 tgid:3263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:845f2400 r5:845f2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) INFO: task kworker/1:34:3263 is blocked on a mutex likely owned by task kworker/0:73:3846. Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8409e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:ebc71000 r4:84e06180 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Not tainted 6.15.0-syzkaller #0 r5:8409d400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe06c9d20 to 0xe06c9d68) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 r5:838b5400 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dd8900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f2ad000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb2b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85de4b8c r4:85de4800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85de4b8c r4:84d4d800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b5400 r8:84d4d82c r7:82804d40 r6:dddced40 r5:dddced60 r4:84d4d800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d4d800 r8:8027ecf4 r7:dfc5de60 r6:84e06300 r5:838b5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 INFO: task kworker/0:44:3272 blocked for more than 451 seconds. r5:84cde000 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dd8a80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e06c9dc0 r5:85e2bb8c r4:85e2b800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:845f3c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845f3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb35e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dba040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:845f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba8d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cc38c r4:856cc000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856cc38c r4:84e06480 5fa0: 00000000 00000000 00000000 00000000 r4:82ac11e4 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:845f3000 r4:829189bc r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3280 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3280 tgid:3280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc89d84 r8:00000002 r7:60000113 r6:dfc89d8c r5:845f5400 r4:845f5400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845f5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ebd31000 9fa0: 00000000 00000000 00000000 00000000 9d60: 800f0013 ffffffff r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 9fa0: 00000000 00000000 00000000 00000000 r5:845f6000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc91e08 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:e06c9dc0 r5:85e2bb8c r4:85e2b800 r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3284 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3284 tgid:3284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc99d84 r8:00000002 r7:60000113 r6:dfc99d8c r5:84d10c00 r4:84d10c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d10c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc99e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dba8c0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r5:84d11800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r10:61c88647 r9:84d11800 r8:84e068ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:84ffea80 r4:8500f640 Workqueue: events bpf_prog_free_deferred r5:84d10000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcade08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85105300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d10000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6ff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d0f8c r4:856d0c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d0f8c r4:84e06900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d10000 r8:84e0692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06900 r8:8027ecf4 r7:dfc99e60 r6:84d4de00 r5:84d10000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:43:3290 is blocked on a mutex likely owned by task kworker/0:73:3846. [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000001 task:kworker/1:44 state:D stack:0 pid:3292 tgid:3292 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84d13000 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dbae00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:8500f640 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r5:00001000 r4:ec6c5000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r4:84e06a00 Call trace: r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d038c r4:856d0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d038c r4:84e06a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d13c00 r8:84e06aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06a80 r8:8027ecf4 r7:dfcb5e60 r6:84db8000 r5:84d13c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfccdfb0 to 0xdfccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dc2640 INFO: task kworker/1:47:3298 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:84e06b00 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:49:3302 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:49 state:D stack:0 pid:3302 tgid:3302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfcddd84 r8:00000002 r7:60000113 r6:dfcddd8c r5:84d80000 r4:84d80000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d80000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcdde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9b00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d80000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec63d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cfb8c r4:856cf800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856cfb8c r4:84e06b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d80000 r8:84e06bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06b80 r8:8027ecf4 r7:dfcb5e60 r6:84db8100 r5:84d80000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcddfb0 to 0xdfcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dc2880 INFO: task kworker/1:49:3302 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3304 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3304 tgid:3304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfcedd84 r8:00000002 r7:60000113 r6:dfcedd8c r5:84d81800 r4:84d81800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d81800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcede08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dbaac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d81800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856ceb8c r4:856ce800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856ceb8c r4:84e06c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d81800 r8:84e06c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06c00 r8:8027ecf4 r7:dfcb5e60 r6:84db8180 r5:84d81800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcedfb0 to 0xdfcedff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r5:800f0013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85e2bb8c r4:85e2b800 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd01e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dbadc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d80c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec61f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cf38c r4:856cf000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856cf38c r4:84e06c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d80c00 r8:84e06cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06c80 r8:8027ecf4 r7:dfcede60 r6:84db8200 r5:84d80c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd01fb0 to 0xdfd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dc2e00 INFO: task kworker/1:51:3306 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:3308 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:3308 tgid:3308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd0dd84 r8:00000002 r7:60000113 r6:dfd0dd8c r5:84d82400 r4:84d82400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d82400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd0de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dbac00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d82400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec605000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856cef8c r4:856cec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856cef8c r4:84e06d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d82400 r8:84e06d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06d00 r8:8027ecf4 r7:dfcede60 r6:84db8280 r5:84d82400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd0dfb0 to 0xdfd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dc2f00 INFO: task kworker/1:52:3308 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:3310 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:3310 tgid:3310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd1dd84 r8:00000002 r7:60000113 r6:dfd1dd8c r5:84d83000 r4:84d83000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d83000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd1de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851056c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d83000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb36b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d1b8c r4:856d1800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d1b8c r4:84e06d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d83000 r8:84e06dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06d80 r8:8027ecf4 r7:dfcede60 r6:84db8300 r5:84d83000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd1dfb0 to 0xdfd1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d4e440 INFO: task kworker/1:53:3310 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:3312 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:3312 tgid:3312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd29d84 r8:00000002 r7:60000113 r6:dfd29d8c r5:84d83c00 r4:84d83c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d83c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd29e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85105400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d83c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d138c r4:856d1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d138c r4:84e06e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d83c00 r8:84e06e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06e00 r8:8027ecf4 r7:dfd1de60 r6:84db8380 r5:84d83c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd29fb0 to 0xdfd29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d99080 INFO: task kworker/1:54:3312 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:3314 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:3314 tgid:3314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd39d84 r8:00000002 r7:60000113 r6:dfd39d8c r5:84d84800 r4:84d84800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d84800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd39e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85105540 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d84800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadcb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d178c r4:856d1400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d178c r4:84e06e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d84800 r8:84e06eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06e80 r8:8027ecf4 r7:dfd1de60 r6:84db8400 r5:84d84800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd39fb0 to 0xdfd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d992c0 INFO: task kworker/1:55:3314 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85e2bb8c r4:85e2b800 r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:3317 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:3317 tgid:3317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd41d84 r8:00000002 r7:60000113 r6:dfd41d8c r5:84d86000 r4:84d86000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d86000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd41e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851057c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d86000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb549000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d1f8c r4:856d1c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d1f8c r4:84e06f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d86000 r8:84e06f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06f00 r8:8027ecf4 r7:dfd1de60 r6:84db8480 r5:84d86000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd41fb0 to 0xdfd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d992c0 INFO: task kworker/1:56:3317 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:57:3318 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:57 state:D stack:0 pid:3318 tgid:3318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd4dd84 r8:00000002 r7:60000113 r6:dfd4dd8c r5:84d86c00 r4:84d86c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d86c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd4de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851058c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d86c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6cb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d238c r4:856d2000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d238c r4:84e06f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d86c00 r8:84e06fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84e06f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06f80 r8:8027ecf4 r7:dfd41e60 r6:84db8500 r5:84d86c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd4dfb0 to 0xdfd4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d99480 INFO: task kworker/1:57:3318 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:59:3322 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:59 state:D stack:0 pid:3322 tgid:3322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd5dd84 r8:00000002 r7:60000113 r6:dfd5dd8c r5:84d14800 r4:84d14800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d14800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd5de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851059c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d14800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb837000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d278c r4:856d2400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d278c r4:84da1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d14800 r8:84da102c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84da1000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1000 r8:8027ecf4 r7:dfd59e60 r6:84db8600 r5:84d14800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd5dfb0 to 0xdfd5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d99540 INFO: task kworker/1:59:3322 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:60:3324 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:60 state:D stack:0 pid:3324 tgid:3324 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd6dd84 r8:00000002 r7:60000113 r6:dfd6dd8c r5:84d70c00 r4:84d70c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d70c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd6de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85105a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d70c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9f9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d2b8c r4:856d2800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d2b8c r4:84da1080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d70c00 r8:84da10ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84da1080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1080 r8:8027ecf4 r7:dfd59e60 r6:84db8680 r5:84d70c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd6dfb0 to 0xdfd6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d99700 INFO: task kworker/1:60:3324 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:61:3326 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:3326 tgid:3326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd79d84 r8:00000002 r7:60000113 r6:dfd79d8c r5:84d70000 r4:84d70000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d70000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd79e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85105d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d70000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d2f8c r4:856d2c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d2f8c r4:84da1100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d70000 r8:84da112c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84da1100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1100 r8:8027ecf4 r7:dfd59e60 r6:84db8700 r5:84d70000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd79fb0 to 0xdfd79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d997c0 INFO: task kworker/1:61:3326 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:62:3329 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:62 state:D stack:0 pid:3329 tgid:3329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd91d84 r8:00000002 r7:60000113 r6:dfd91d8c r5:84d71800 r4:84d71800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d71800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd91e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85105e00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d71800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbbf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d338c r4:856d3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d338c r4:84da1180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d71800 r8:84da11ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84da1180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da1180 r8:8027ecf4 r7:dfd59e60 r6:84db8780 r5:84d71800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd91fb0 to 0xdfd91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d99900 INFO: task kworker/1:62:3329 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:289:3842 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:289 state:D stack:0 pid:3842 tgid:3842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06b9d84 r8:00000002 r7:60000013 r6:e06b9d8c r5:84f3ec00 r4:84f3ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f3ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501ed40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84f3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c178c r4:850c1400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c178c r4:85004c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f3ec00 r8:85004c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004c00 r8:8027ecf4 r7:e06b1e60 r6:85004c80 r5:84f3ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85016a80 INFO: task kworker/1:289:3842 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:72:3845 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:72 state:D stack:0 pid:3845 tgid:3845 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06c5d84 r8:00000002 r7:60000113 r6:e06c5d8c r5:85079800 r4:85079800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85079800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84520780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85079800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88f9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506c78c r4:8506c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506c78c r4:84ffea00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85079800 r8:84ffea2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea00 r8:8027ecf4 r7:e0669e60 r6:85004d00 r5:85079800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c5fb0 to 0xe06c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/0:72:3845 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:74:3850 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:74 state:D stack:0 pid:3850 tgid:3850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06d5d84 r8:00000002 r7:60000113 r6:e06d5d8c r5:8507bc00 r4:8507bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85022700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8507bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e039f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c378c r4:850c3400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c378c r4:84ffeb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507bc00 r8:84ffeb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffeb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffeb00 r8:8027ecf4 r7:e06c5e60 r6:85004f00 r5:8507bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d5fb0 to 0xe06d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db6b80 INFO: task kworker/0:74:3850 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:291:3852 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:291 state:D stack:0 pid:3852 tgid:3852 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06d1d84 r8:00000002 r7:60000113 r6:e06d1d8c r5:8507b000 r4:8507b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdad000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c038c r4:850c0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c038c r4:85004f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507b000 r8:85004fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004f80 r8:8027ecf4 r7:e06b9e60 r6:85018000 r5:8507b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d1fb0 to 0xe06d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e5c0 INFO: task kworker/1:291:3852 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:292:3855 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:292 state:D stack:0 pid:3855 tgid:3855 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06b5d84 r8:00000002 r7:60000113 r6:e06b5d8c r5:8507c800 r4:8507c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507c800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c078c r4:850c0400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c078c r4:85018080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507c800 r8:850180ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018080 r8:8027ecf4 r7:e06b9e60 r6:85018100 r5:8507c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b5fb0 to 0xe06b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e680 INFO: task kworker/1:292:3855 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:293:3857 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:293 state:D stack:0 pid:3857 tgid:3857 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0695d84 r8:00000002 r7:60000113 r6:e0695d8c r5:8507d400 r4:8507d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0695e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507d400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff03000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c0b8c r4:850c0800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c0b8c r4:85018180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507d400 r8:850181ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018180 r8:8027ecf4 r7:e06b9e60 r6:85018200 r5:8507d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0695fb0 to 0xe0695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e780 INFO: task kworker/1:293:3857 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:294:3859 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:294 state:D stack:0 pid:3859 tgid:3859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06d9d84 r8:00000002 r7:60000113 r6:e06d9d8c r5:8507e000 r4:8507e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e9c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507e000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff2f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c0f8c r4:850c0c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c0f8c r4:85018280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507e000 r8:850182ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018280 r8:8027ecf4 r7:e06b9e60 r6:85018300 r5:8507e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d9fb0 to 0xe06d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e900 INFO: task kworker/1:294:3859 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:295:3860 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:295 state:D stack:0 pid:3860 tgid:3860 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06e1d84 r8:00000002 r7:60000013 r6:e06e1d8c r5:8507ec00 r4:8507ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501eb40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff6b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c138c r4:850c1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c138c r4:85018380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507ec00 r8:850183ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018380 r8:8027ecf4 r7:e06b9e60 r6:85018400 r5:8507ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e1fb0 to 0xe06e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501ec80 INFO: task kworker/1:295:3860 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:296:3863 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:296 state:D stack:0 pid:3863 tgid:3863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06ddd84 r8:00000002 r7:60000113 r6:e06ddd8c r5:8507a400 r4:8507a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06dde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501eec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c1b8c r4:850c1800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c1b8c r4:85018480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507a400 r8:850184ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018480 r8:8027ecf4 r7:e06b9e60 r6:85018500 r5:8507a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06ddfb0 to 0xe06ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501ed00 INFO: task kworker/1:296:3863 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:297:3866 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:297 state:D stack:0 pid:3866 tgid:3866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06e9d84 r8:00000002 r7:60000013 r6:e06e9d8c r5:84f41800 r4:84f41800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f41800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85016cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84f41800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c1f8c r4:850c1c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c1f8c r4:85018580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f41800 r8:850185ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018580 r8:8027ecf4 r7:e06dde60 r6:85018600 r5:84f41800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e9fb0 to 0xe06e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85016c80 INFO: task kworker/1:297:3866 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:298:3867 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:298 state:D stack:0 pid:3867 tgid:3867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06f1d84 r8:00000002 r7:60000013 r6:e06f1d8c r5:85080000 r4:85080000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85080000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502f040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85080000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0031000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c278c r4:850c2400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c278c r4:85018680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85080000 r8:850186ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018680 r8:8027ecf4 r7:e06e9e60 r6:85018700 r5:85080000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f1fb0 to 0xe06f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501efc0 INFO: task kworker/1:298:3867 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:299:3868 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:299 state:D stack:0 pid:3868 tgid:3868 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06e5d84 r8:00000002 r7:60000113 r6:e06e5d8c r5:85080c00 r4:85080c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85080c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501ef80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85080c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0007000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c238c r4:850c2000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c238c r4:85018780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85080c00 r8:850187ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018780 r8:8027ecf4 r7:e06f1e60 r6:85018800 r5:85080c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e5fb0 to 0xe06e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501efc0 INFO: task kworker/1:299:3868 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:300:3871 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:300 state:D stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06f5d84 r8:00000002 r7:60000013 r6:e06f5d8c r5:85081800 r4:85081800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85081800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502f140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85081800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c2b8c r4:850c2800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c2b8c r4:85018880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85081800 r8:850188ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018880 r8:8027ecf4 r7:e06f1e60 r6:85018900 r5:85081800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f5fb0 to 0xe06f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502f1c0 INFO: task kworker/1:300:3871 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:301:3873 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:301 state:D stack:0 pid:3873 tgid:3873 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06f9d84 r8:00000002 r7:60000113 r6:e06f9d8c r5:85082400 r4:85082400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85082400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502f2c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85082400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e006d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c2f8c r4:850c2c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c2f8c r4:85018980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85082400 r8:850189ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018980 r8:8027ecf4 r7:e06f5e60 r6:85018a00 r5:85082400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f9fb0 to 0xe06f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502f100 INFO: task kworker/1:301:3873 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:302:3875 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:302 state:D stack:0 pid:3875 tgid:3875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06fdd84 r8:00000002 r7:60000013 r6:e06fdd8c r5:85083000 r4:85083000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85083000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06fde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502f480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85083000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0089000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c338c r4:850c3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c338c r4:85018a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85083000 r8:85018aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018a80 r8:8027ecf4 r7:e06f9e60 r6:85018b00 r5:85083000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06fdfb0 to 0xe06fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502f300 INFO: task kworker/1:302:3875 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:303:3877 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:303 state:D stack:0 pid:3877 tgid:3877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0701d84 r8:00000002 r7:60000013 r6:e0701d8c r5:85083c00 r4:85083c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85083c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0701e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502f840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85083c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03ad000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c3b8c r4:850c3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c3b8c r4:85018b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85083c00 r8:85018bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018b80 r8:8027ecf4 r7:e06fde60 r6:85018c00 r5:85083c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0701fb0 to 0xe0701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502f3c0 INFO: task kworker/1:303:3877 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:304:3879 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:304 state:D stack:0 pid:3879 tgid:3879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e070dd84 r8:00000002 r7:60000113 r6:e070dd8c r5:85085400 r4:85085400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85085400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e070de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502fa40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85085400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03cf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c3f8c r4:850c3c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c3f8c r4:85018c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85085400 r8:85018cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018c80 r8:8027ecf4 r7:e0701e60 r6:85018d00 r5:85085400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe070dfb0 to 0xe070dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502f8c0 INFO: task kworker/1:304:3879 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:75:3881 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:75 state:D stack:0 pid:3881 tgid:3881 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0705d84 r8:00000002 r7:60000113 r6:e0705d8c r5:84fb3c00 r4:84fb3c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84fb3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0705e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510a8c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e001b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d2f8c r4:850d2c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850d2f8c r4:84ffeb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84fb3c00 r8:84ffebac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffeb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffeb80 r8:8027ecf4 r7:e06c5e60 r6:84ffec00 r5:84fb3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0705fb0 to 0xe0705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85022880 INFO: task kworker/0:75:3881 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:305:3882 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:305 state:D stack:0 pid:3882 tgid:3882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0711d84 r8:00000002 r7:60000113 r6:e0711d8c r5:84fb5400 r4:84fb5400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84fb5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0711e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85016bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84fb5400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c8f8c r4:850c8c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c8f8c r4:85018d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84fb5400 r8:85018dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018d80 r8:8027ecf4 r7:e070de60 r6:84ffec80 r5:84fb5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0711fb0 to 0xe0711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502fa00 INFO: task kworker/1:305:3882 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:306:3884 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:306 state:D stack:0 pid:3884 tgid:3884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0715d84 r8:00000002 r7:60000113 r6:e0715d8c r5:84fb6000 r4:84fb6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84fb6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0715e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502fbc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84fb6000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df975000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c838c r4:850c8000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c838c r4:85018e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84fb6000 r8:85018e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018e00 r8:8027ecf4 r7:e0711e60 r6:84ffed00 r5:84fb6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0715fb0 to 0xe0715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502f740 INFO: task kworker/1:306:3884 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:307:3887 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:307 state:D stack:0 pid:3887 tgid:3887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0671d84 r8:00000002 r7:60000013 r6:e0671d8c r5:84fb6c00 r4:84fb6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84fb6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0671e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502fcc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84fb6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c878c r4:850c8400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c878c r4:85018e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84fb6c00 r8:85018eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018e80 r8:8027ecf4 r7:e0711e60 r6:84ffed80 r5:84fb6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0671fb0 to 0xe0671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502fd40 INFO: task kworker/1:307:3887 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:308:3889 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:308 state:D stack:0 pid:3889 tgid:3889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0691d84 r8:00000002 r7:60000113 r6:e0691d8c r5:84fb4800 r4:84fb4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84fb4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0691e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502fd80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84fb4800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb89000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c8b8c r4:850c8800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c8b8c r4:85018f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84fb4800 r8:85018f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018f00 r8:8027ecf4 r7:e0711e60 r6:84ffee00 r5:84fb4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0691fb0 to 0xe0691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502fd40 INFO: task kworker/1:308:3889 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:309:3891 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:309 state:D stack:0 pid:3891 tgid:3891 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e069dd84 r8:00000002 r7:60000013 r6:e069dd8c r5:84fb3000 r4:84fb3000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84fb3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e069de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db9040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84fb3000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc3f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c938c r4:850c9000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c938c r4:85018f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84fb3000 r8:85018fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85018f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85018f80 r8:8027ecf4 r7:e0711e60 r6:84ffee80 r5:84fb3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe069dfb0 to 0xe069dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502fd00 INFO: task kworker/1:309:3891 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:310:3893 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:310 state:D stack:0 pid:3893 tgid:3893 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0719d84 r8:00000002 r7:60000013 r6:e0719d8c r5:84ce0000 r4:84ce0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ce0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0719e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db9200 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ce0000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe17000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c978c r4:850c9400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c978c r4:85027000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce0000 r8:8502702c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027000 r8:8027ecf4 r7:e069de60 r6:84ffef00 r5:84ce0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0719fb0 to 0xe0719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db9100 INFO: task kworker/1:310:3893 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 Exception stack(0xe06c9fb0 to 0xe06c9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e071de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db93c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ce0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe41000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c9b8c r4:850c9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c9b8c r4:85027080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce0c00 r8:850270ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027080 r8:8027ecf4 r7:e0719e60 r6:84ffef80 r5:84ce0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe071dfb0 to 0xe071dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db91c0 INFO: task kworker/1:311:3895 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:312:3897 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:312 state:D stack:0 pid:3897 tgid:3897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0721d84 r8:00000002 r7:60000013 r6:e0721d8c r5:84ce1800 r4:84ce1800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ce1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0721e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db9440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ce1800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c9f8c r4:850c9c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c9f8c r4:85027100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce1800 r8:8502712c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027100 r8:8027ecf4 r7:e071de60 r6:84db4000 r5:84ce1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db9380 INFO: task kworker/1:312:3897 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:313:3899 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:313 state:D stack:0 pid:3899 tgid:3899 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0725d84 r8:00000002 r7:60000113 r6:e0725d8c r5:84ce2400 r4:84ce2400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ce2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0725e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db9900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ce2400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0467000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850caf8c r4:850cac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850caf8c r4:85027180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce2400 r8:850271ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027180 r8:8027ecf4 r7:e0721e60 r6:84db4080 r5:84ce2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0725fb0 to 0xe0725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db9500 INFO: task kworker/1:313:3899 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:314:3900 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:314 state:D stack:0 pid:3900 tgid:3900 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0735d84 r8:00000002 r7:60000113 r6:e0735d8c r5:84ce3000 r4:84ce3000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ce3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0735e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db9540 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ce3000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ca38c r4:850ca000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ca38c r4:85027200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce3000 r8:8502722c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027200 r8:8027ecf4 r7:e0725e60 r6:84db4100 r5:84ce3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0735fb0 to 0xe0735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db95c0 INFO: task kworker/1:314:3900 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:315:3903 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:315 state:D stack:0 pid:3903 tgid:3903 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0739d84 r8:00000002 r7:60000113 r6:e0739d8c r5:84ce3c00 r4:84ce3c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ce3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0739e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db9680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ce3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ca78c r4:850ca400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ca78c r4:85027280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce3c00 r8:850272ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027280 r8:8027ecf4 r7:e0725e60 r6:84db4180 r5:84ce3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0739fb0 to 0xe0739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db95c0 INFO: task kworker/1:315:3903 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/1:316:3904 blocked for more than 452 seconds. Workqueue: events bpf_prog_free_deferred r4:84ce4800 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e073de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ce4800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03fd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cab8c r4:850ca800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cab8c r4:85027300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce4800 r8:8502732c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027300 r8:8027ecf4 r7:e0725e60 r6:84db4200 r5:84ce4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe073dfb0 to 0xe073dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db9980 INFO: task kworker/1:316:3904 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:317:3907 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:317 state:D stack:0 pid:3907 tgid:3907 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0745d84 r8:00000002 r7:60000113 r6:e0745d8c r5:84ce6000 r4:84ce6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ce6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0745e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db9a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ce6000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e048f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cb38c r4:850cb000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cb38c r4:85027380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce6000 r8:850273ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027380 r8:8027ecf4 r7:e0725e60 r6:84db4280 r5:84ce6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0745fb0 to 0xe0745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db9940 INFO: task kworker/1:317:3907 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:318:3909 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:318 state:D stack:0 pid:3909 tgid:3909 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e074dd84 r8:00000002 r7:60000013 r6:e074dd8c r5:84e98000 r4:84e98000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e98000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e074de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db9b40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e98000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0499000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cb78c r4:850cb400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cb78c r4:85027400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e98000 r8:8502742c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027400 r8:8027ecf4 r7:e0745e60 r6:84db4300 r5:84e98000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe074dfb0 to 0xe074dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db9a00 INFO: task kworker/1:318:3909 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b0290000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:319:3911 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:319 state:D stack:0 pid:3911 tgid:3911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0755d84 r8:00000002 r7:60000013 r6:e0755d8c r5:84e99800 r4:84e99800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e99800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0755e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db9d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e99800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cbb8c r4:850cb800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cbb8c r4:85027480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e99800 r8:850274ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027480 r8:8027ecf4 r7:e074de60 r6:84db4380 r5:84e99800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0755fb0 to 0xe0755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db9b80 INFO: task kworker/1:319:3911 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b2dca000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:320:3912 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:320 state:D stack:0 pid:3912 tgid:3912 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0759d84 r8:00000002 r7:60000013 r6:e0759d8c r5:84e9a400 r4:84e9a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e9a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0759e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca3280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e9a400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e058b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cd38c r4:850cd000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cd38c r4:85027500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e9a400 r8:8502752c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027500 r8:8027ecf4 r7:e0755e60 r6:84db4400 r5:84e9a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0759fb0 to 0xe0759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db9b80 INFO: task kworker/1:320:3912 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b3099000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:321:3914 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:321 state:D stack:0 pid:3914 tgid:3914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0761d84 r8:00000002 r7:60000113 r6:e0761d8c r5:84e9bc00 r4:84e9bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e9bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0761e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db9800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e9bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04e5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cbf8c r4:850cbc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cbf8c r4:85027580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e9bc00 r8:850275ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027580 r8:8027ecf4 r7:e0759e60 r6:84db4480 r5:84e9bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0761fb0 to 0xe0761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db9f40 INFO: task kworker/1:321:3914 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b3439000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:829189c0 r9:e0771d84 r8:00000002 r7:60000113 r6:e0771d8c r5:84e9b000 r4:84e9b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e9b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0771e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850222c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e9b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04f5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cc38c r4:850cc000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cc38c r4:85027600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e9b000 r8:8502762c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027600 r8:8027ecf4 r7:e0759e60 r6:84db4500 r5:84e9b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db9e00 INFO: task kworker/1:322:3916 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b3439000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:323:3918 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:323 state:D stack:0 pid:3918 tgid:3918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0779d84 r8:00000002 r7:60000113 r6:e0779d8c r5:84e9c800 r4:84e9c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e9c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0779e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500fc40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e9c800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0503000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cc78c r4:850cc400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cc78c r4:85027680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e9c800 r8:850276ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027680 r8:8027ecf4 r7:e0759e60 r6:84db4580 r5:84e9c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0779fb0 to 0xe0779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84db9e00 INFO: task kworker/1:323:3918 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b36a8000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:324:3920 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:324 state:D stack:0 pid:3920 tgid:3920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0781d84 r8:00000002 r7:60000113 r6:e0781d8c r5:84e9d400 r4:84e9d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e9d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0781e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca3040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e9d400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e051b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ccb8c r4:850cc800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ccb8c r4:85027700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e9d400 r8:8502772c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027700 r8:8027ecf4 r7:e0759e60 r6:84db4600 r5:84e9d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0781fb0 to 0xe0781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca3080 INFO: task kworker/1:324:3920 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b3901000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:325:3922 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:325 state:D stack:0 pid:3922 tgid:3922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e079dd84 r8:00000002 r7:60000113 r6:e079dd8c r5:84e98c00 r4:84e98c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e98c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e079de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca31c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e98c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0525000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ccf8c r4:850ccc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ccf8c r4:85027780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e98c00 r8:850277ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027780 r8:8027ecf4 r7:e0759e60 r6:84db4680 r5:84e98c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe079dfb0 to 0xe079dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca3080 INFO: task kworker/1:325:3922 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b3901000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:326:3924 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:326 state:D stack:0 pid:3924 tgid:3924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07a9d84 r8:00000002 r7:60000113 r6:e07a9d8c r5:84e9ec00 r4:84e9ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e9ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07a9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca3780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e9ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0615000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ce38c r4:850ce000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ce38c r4:85027800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e9ec00 r8:8502782c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027800 r8:8027ecf4 r7:e0759e60 r6:84db4700 r5:84e9ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07a9fb0 to 0xe07a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca3180 INFO: task kworker/1:326:3924 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b3cbf000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:327:3926 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:327 state:D stack:0 pid:3926 tgid:3926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07c1d84 r8:00000002 r7:60000113 r6:e07c1d8c r5:84ce5400 r4:84ce5400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ce5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca33c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ce5400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ab000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cd78c r4:850cd400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cd78c r4:85027880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce5400 r8:850278ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027880 r8:8027ecf4 r7:e07a9e60 r6:84db4780 r5:84ce5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07c1fb0 to 0xe07c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca32c0 INFO: task kworker/1:327:3926 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b3cbf000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:328:3928 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:328 state:D stack:0 pid:3928 tgid:3928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07c9d84 r8:00000002 r7:60000113 r6:e07c9d8c r5:84ce8000 r4:84ce8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ce8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca3500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ce8000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cdb8c r4:850cd800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cdb8c r4:85027900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce8000 r8:8502792c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027900 r8:8027ecf4 r7:e07a9e60 r6:84db4800 r5:84ce8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07c9fb0 to 0xe07c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca3400 INFO: task kworker/1:328:3928 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b3f23000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:329:3930 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:329 state:D stack:0 pid:3930 tgid:3930 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07d1d84 r8:00000002 r7:60000113 r6:e07d1d8c r5:84ce9800 r4:84ce9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ce9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca3640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ce9800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e060b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cdf8c r4:850cdc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cdf8c r4:85027980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce9800 r8:850279ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027980 r8:8027ecf4 r7:e07a9e60 r6:84db4880 r5:84ce9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07d1fb0 to 0xe07d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca3540 INFO: task kworker/1:329:3930 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b3f23000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:330:3933 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:330 state:D stack:0 pid:3933 tgid:3933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07ddd84 r8:00000002 r7:60000113 r6:e07ddd8c r5:84ce8c00 r4:84ce8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ce8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07dde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca3900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ce8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0627000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ce78c r4:850ce400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ce78c r4:85027a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce8c00 r8:85027a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027a00 r8:8027ecf4 r7:e07a9e60 r6:84db4900 r5:84ce8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07ddfb0 to 0xe07ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca3680 INFO: task kworker/1:330:3933 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b4132000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:331:3936 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:331 state:D stack:0 pid:3936 tgid:3936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07e5d84 r8:00000002 r7:60000013 r6:e07e5d8c r5:84ceb000 r4:84ceb000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ceb000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07e5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca39c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ceb000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0631000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ceb8c r4:850ce800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ceb8c r4:85027a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ceb000 r8:85027aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027a80 r8:8027ecf4 r7:e07dde60 r6:84db4980 r5:84ceb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca3880 INFO: task kworker/1:331:3936 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b4354000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:332:3937 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:332 state:D stack:0 pid:3937 tgid:3937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07e9d84 r8:00000002 r7:60000113 r6:e07e9d8c r5:84cebc00 r4:84cebc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cebc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07e9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca3dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0683000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cf38c r4:850cf000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cf38c r4:85027b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cebc00 r8:85027b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027b00 r8:8027ecf4 r7:e07e5e60 r6:84db4a00 r5:84cebc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e9fb0 to 0xe07e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca3a00 INFO: task kworker/1:332:3937 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b4462000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:333:3938 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:333 state:D stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07d9d84 r8:00000002 r7:60000013 r6:e07d9d8c r5:85086c00 r4:85086c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85086c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca3c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85086c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e063f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cef8c r4:850cec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cef8c r4:85027b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85086c00 r8:85027bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027b80 r8:8027ecf4 r7:e07e9e60 r6:85027c00 r5:85086c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07d9fb0 to 0xe07d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca3d40 INFO: task kworker/1:333:3938 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b4bb4000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:334:3942 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:334 state:D stack:0 pid:3942 tgid:3942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0709d84 r8:00000002 r7:60000013 r6:e0709d8c r5:85088c00 r4:85088c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85088c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0709e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db6e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85088c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0699000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cf78c r4:850cf400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cf78c r4:85027c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85088c00 r8:85027cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027c80 r8:8027ecf4 r7:e07e9e60 r6:85027d00 r5:85088c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0709fb0 to 0xe0709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca3f40 INFO: task kworker/1:334:3942 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b4c4a000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:335:3944 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:335 state:D stack:0 pid:3944 tgid:3944 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0741d84 r8:00000002 r7:60000013 r6:e0741d8c r5:85089800 r4:85089800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85089800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0741e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fa040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85089800 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0783000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cfb8c r4:850cf800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cfb8c r4:85027d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85089800 r8:85027dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027d80 r8:8027ecf4 r7:e0709e60 r6:85027e00 r5:85089800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0741fb0 to 0xe0741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fa000 INFO: task kworker/1:335:3944 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b4f82000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:336:3946 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:336 state:D stack:0 pid:3946 tgid:3946 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07edd84 r8:00000002 r7:60000113 r6:e07edd8c r5:8508a400 r4:8508a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8508a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07ede08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fa300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8508a400 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cff8c r4:850cfc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cff8c r4:85027e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508a400 r8:85027eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027e80 r8:8027ecf4 r7:e0741e60 r6:85027f00 r5:8508a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07edfb0 to 0xe07edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fa240 INFO: task kworker/1:336:3946 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b5259000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:337:3948 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:337 state:D stack:0 pid:3948 tgid:3948 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06bdd84 r8:00000002 r7:60000013 r6:e06bdd8c r5:8508b000 r4:8508b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8508b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06bde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fa380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8508b000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa8d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d038c r4:850d0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850d038c r4:85027f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508b000 r8:85027fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85027f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85027f80 r8:8027ecf4 r7:e07ede60 r6:850fb000 r5:8508b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06bdfb0 to 0xe06bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fa180 INFO: task kworker/1:337:3948 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b5490000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:338:3950 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:338 state:D stack:0 pid:3950 tgid:3950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07f1d84 r8:00000002 r7:60000013 r6:e07f1d8c r5:8508bc00 r4:8508bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8508bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fa500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8508bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d078c r4:850d0400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850d078c r4:850fb080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508bc00 r8:850fb0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fb080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb080 r8:8027ecf4 r7:e06bde60 r6:850fb100 r5:8508bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07f1fb0 to 0xe07f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fa340 INFO: task kworker/1:338:3950 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b5827000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:339:3952 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:339 state:D stack:0 pid:3952 tgid:3952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07f5d84 r8:00000002 r7:60000113 r6:e07f5d8c r5:8508c800 r4:8508c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8508c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fa6c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8508c800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc75000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d0b8c r4:850d0800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850d0b8c r4:850fb180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508c800 r8:850fb1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fb180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb180 r8:8027ecf4 r7:e07f1e60 r6:850fb200 r5:8508c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07f5fb0 to 0xe07f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fa440 INFO: task kworker/1:339:3952 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b5bba000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:340:3954 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:340 state:D stack:0 pid:3954 tgid:3954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07f9d84 r8:00000002 r7:60000013 r6:e07f9d8c r5:8508d400 r4:8508d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8508d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fa840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8508d400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcbd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d0f8c r4:850d0c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850d0f8c r4:850fb280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508d400 r8:850fb2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fb280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb280 r8:8027ecf4 r7:e07f5e60 r6:850fb300 r5:8508d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07f9fb0 to 0xe07f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fa5c0 INFO: task kworker/1:340:3954 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b6079000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:341:3956 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:341 state:D stack:0 pid:3956 tgid:3956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e4805d84 r8:00000002 r7:60000113 r6:e4805d8c r5:8508e000 r4:8508e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8508e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4805e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fa900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8508e000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd0f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d138c r4:850d1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850d138c r4:850fb380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508e000 r8:850fb3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fb380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb380 r8:8027ecf4 r7:e07f9e60 r6:850fb400 r5:8508e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4805fb0 to 0xe4805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fa780 INFO: task kworker/1:341:3956 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b6079000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:342:3958 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:342 state:D stack:0 pid:3958 tgid:3958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e480dd84 r8:00000002 r7:60000113 r6:e480dd8c r5:85088000 r4:85088000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85088000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e480de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fac40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85088000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd4f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d178c r4:850d1400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850d178c r4:850fb480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85088000 r8:850fb4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fb480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb480 r8:8027ecf4 r7:e4805e60 r6:850fb500 r5:85088000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe480dfb0 to 0xe480dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fa940 INFO: task kworker/1:342:3958 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b6345000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:343:3960 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:343 state:D stack:0 pid:3960 tgid:3960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e4831d84 r8:00000002 r7:60000113 r6:e4831d8c r5:85084800 r4:85084800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85084800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4831e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fae80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85084800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd85000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d1b8c r4:850d1800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850d1b8c r4:850fb580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85084800 r8:850fb5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fb580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb580 r8:8027ecf4 r7:e480de60 r6:850fb600 r5:85084800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4831fb0 to 0xe4831ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fa780 INFO: task kworker/1:343:3960 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b6345000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:344:3961 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:344 state:D stack:0 pid:3961 tgid:3961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e4835d84 r8:00000002 r7:60000113 r6:e4835d8c r5:84cec800 r4:84cec800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cec800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4835e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e00b00 r5:00001000 r4:dfdcb000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cec800 r8:850fb6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fb680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb680 r8:8027ecf4 r7:e4831e60 r6:84db4a80 r5:84cec800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4835fb0 to 0xe4835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fa780 INFO: task kworker/1:344:3961 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b666a000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:345:3964 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:345 state:D stack:0 pid:3964 tgid:3964 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e4841d84 r8:00000002 r7:60000113 r6:e4841d8c r5:84ced400 r4:84ced400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ced400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4841e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca3bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ced400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff0f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d238c r4:850d2000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850d238c r4:850fb700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ced400 r8:850fb72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fb700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb700 r8:8027ecf4 r7:e4835e60 r6:84db4b00 r5:84ced400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4841fb0 to 0xe4841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e00b40 INFO: task kworker/1:345:3964 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r4:e06c9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:346:3966 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:346 state:D stack:0 pid:3966 tgid:3966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e4849d84 r8:00000002 r7:60000113 r6:e4849d8c r5:84cee000 r4:84cee000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cee000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4849e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510b580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cee000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0043000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d338c r4:850d3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850d338c r4:850fb780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cee000 r8:850fb7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fb780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb780 r8:8027ecf4 r7:e4841e60 r6:84db4b80 r5:84cee000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4849fb0 to 0xe4849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca3ec0 INFO: task kworker/1:346:3966 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r4:e06c9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:347:3967 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:347 state:D stack:0 pid:3967 tgid:3967 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e4855d84 r8:00000002 r7:60000013 r6:e4855d8c r5:84ceec00 r4:84ceec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ceec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4855e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510b040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ceec00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffcb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d278c r4:850d2400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850d278c r4:850fb800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ceec00 r8:850fb82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fb800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb800 r8:8027ecf4 r7:e4849e60 r6:84db4c00 r5:84ceec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4855fb0 to 0xe4855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca3ec0 INFO: task kworker/1:347:3967 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b6c7f000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:348:3970 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:348 state:D stack:0 pid:3970 tgid:3970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e485dd84 r8:00000002 r7:60000113 r6:e485dd8c r5:84ce6c00 r4:84ce6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ce6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e485de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510b180 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ce6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffeb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d2b8c r4:850d2800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850d2b8c r4:850fb880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce6c00 r8:850fb8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fb880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb880 r8:8027ecf4 r7:e4849e60 r6:84db4c80 r5:84ce6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe485dfb0 to 0xe485dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510b080 INFO: task kworker/1:348:3970 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b6ff3000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:349:3971 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:349 state:D stack:0 pid:3971 tgid:3971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e4861d84 r8:00000002 r7:60000113 r6:e4861d8c r5:84c78000 r4:84c78000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c78000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4861e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510b680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c78000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df991000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d378c r4:850d3400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850d378c r4:850fb900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c78000 r8:850fb92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fb900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb900 r8:8027ecf4 r7:e4849e60 r6:84db4d00 r5:84c78000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4861fb0 to 0xe4861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510b140 INFO: task kworker/1:349:3971 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b7701000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:76:3974 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:76 state:D stack:0 pid:3974 tgid:3974 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e4809d84 r8:00000002 r7:60000113 r6:e4809d8c r5:84c78c00 r4:84c78c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c78c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4809e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84520900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c78c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e079f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847ffb8c r4:847ff800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:847ffb8c r4:84db4d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c78c00 r8:84db4dac r7:82804d40 r6:dddced40 r5:dddced60 r4:84db4d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84db4d80 r8:8027ecf4 r7:e06c5e60 r6:84db4e00 r5:84c78c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4809fb0 to 0xe4809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510a900 INFO: task kworker/0:76:3974 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b7701000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:350:3976 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:350 state:D stack:0 pid:3976 tgid:3976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07d5d84 r8:00000002 r7:60000113 r6:e07d5d8c r5:84c7a400 r4:84c7a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c7a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510b780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c7a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d3b8c r4:850d3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850d3b8c r4:850fb980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c7a400 r8:850fb9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fb980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb980 r8:8027ecf4 r7:e4861e60 r6:84db4e80 r5:84c7a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07d5fb0 to 0xe07d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510b4c0 INFO: task kworker/1:350:3976 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b7701000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:351:3979 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:351 state:D stack:0 pid:3979 tgid:3979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e4871d84 r8:00000002 r7:60000013 r6:e4871d8c r5:84c7bc00 r4:84c7bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c7bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4871e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d8ca80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e054f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850dfb8c r4:850df800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850dfb8c r4:850fba00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c7bc00 r8:850fba2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fba00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fba00 r8:8027ecf4 r7:e07d5e60 r6:84db4f00 r5:84c7bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4871fb0 to 0xe4871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510b700 INFO: task kworker/1:351:3979 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b7cd7000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:352:3980 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:352 state:D stack:0 pid:3980 tgid:3980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e4879d84 r8:00000002 r7:60000013 r6:e4879d8c r5:84c7c800 r4:84c7c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c7c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4879e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510b940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d3f8c r4:850d3c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850d3f8c r4:850fba80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c7c800 r8:850fbaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fba80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fba80 r8:8027ecf4 r7:e4871e60 r6:84db4f80 r5:84c7c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4879fb0 to 0xe4879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510b700 INFO: task kworker/1:352:3980 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b7f12000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85e2bb8c r4:85e2b800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:353:3982 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:353 state:D stack:0 pid:3982 tgid:3982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e8889d84 r8:00000002 r7:60000013 r6:e8889d8c r5:84c79800 r4:84c79800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c79800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8889e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510ba40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c79800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc2b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850dc38c r4:850dc000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850dc38c r4:850fbb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c79800 r8:850fbb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fbb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fbb00 r8:8027ecf4 r7:e4871e60 r6:844c7000 r5:84c79800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8889fb0 to 0xe8889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510b700 INFO: task kworker/1:353:3982 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b8253000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:354:3984 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:354 state:D stack:0 pid:3984 tgid:3984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e8891d84 r8:00000002 r7:60000113 r6:e8891d8c r5:84c7d400 r4:84c7d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c7d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8891e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510bbc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe21000 r7:ddde2d40 r6:83018200 r5:850dc78c r4:850fbb80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b8397000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 INFO: task kworker/1:355:3986 blocked for more than 453 seconds. r5:84c7e000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:850dcb8c r4:850fbc00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:356:3988 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r7:ddde2d40 r6:83018200 r5:850dcf8c r4:850fbc80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:357:3990 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:357 state:D stack:0 pid:3990 tgid:3990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e88add84 r8:00000002 r7:60000113 r6:e88add8c r5:84e68c00 r4:84e68c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e68c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88ade08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510bec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e68c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0079000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850dd38c r4:850dd000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r5:00001000 r4:eda49000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:358:3992 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:358 state:D stack:0 pid:3992 tgid:3992 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:850fbd80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r5:85e2bb8c r4:85e2b800 r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 Not tainted 6.15.0-syzkaller #0 r5:84e6b000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88bde08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06c9dc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe06c9fb0 to 0xe06c9ff8) task:kworker/1:360 state:D stack:0 pid:3996 tgid:3996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e88c5d84 r8:00000002 r7:60000013 r6:e88c5d8c r5:84e6a400 r4:84e6a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e6a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88c5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d8c140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e6a400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03fb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ddf8c r4:850ddc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ddf8c r4:850fbe80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e6a400 r8:850fbeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fbe80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fbe80 r8:8027ecf4 r7:e4871e60 r6:844c7380 r5:84e6a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06c9d20 to 0xe06c9d68) r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018205 r8:84e69800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850de78c r4:850de400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850de78c r4:850fbf80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e69800 r8:850fbfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fbf80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fbf80 r8:8027ecf4 r7:e4871e60 r6:844c7480 r5:84e69800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88d5fb0 to 0xe88d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d8c2c0 INFO: task kworker/1:362:4000 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b94be000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:363:4002 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:363 state:D stack:0 pid:4002 tgid:4002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e88ddd84 r8:00000002 r7:60000113 r6:e88ddd8c r5:84e6bc00 r4:84e6bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e6bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88dde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d8c380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e6bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850deb8c r4:850de800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850deb8c r4:84513000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e6bc00 r8:8451302c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84513000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84513000 r8:8027ecf4 r7:e4871e60 r6:844c7500 r5:84e6bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88ddfb0 to 0xe88ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d8c380 INFO: task kworker/1:363:4002 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b9748000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:364:4004 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:364 state:D stack:0 pid:4004 tgid:4004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e88e5d84 r8:00000002 r7:60000113 r6:e88e5d8c r5:84e6e000 r4:84e6e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e6e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88e5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d8c600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e6e000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04ed000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850def8c r4:850dec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850def8c r4:84513080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e6e000 r8:845130ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84513080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84513080 r8:8027ecf4 r7:e4871e60 r6:844c7580 r5:84e6e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88e5fb0 to 0xe88e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d8c4c0 INFO: task kworker/1:364:4004 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b9957000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d8c800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e6d400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04fd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850df38c r4:850df000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850df38c r4:84513100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e6d400 r8:8451312c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84513100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84513100 r8:8027ecf4 r7:e4871e60 r6:844c7600 r5:84e6d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88edfb0 to 0xe88edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d8c640 INFO: task kworker/1:365:4006 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: b9957000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85e2bb8c r4:85e2b800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84cea400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:850df78c r4:850df400 Exception stack(0xe4839fb0 to 0xe4839ff8) Call trace: r5:800f0013 r4:80239bb0 r4:00000000 r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84e9e000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d8ce00 r10:61c88647 r9:84e9e000 r8:845132ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d8ca40 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:368:4013 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:368 state:D stack:0 pid:4013 tgid:4013 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e4865d84 r8:00000002 r7:60000113 r6:e4865d8c r5:85086000 r4:85086000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:850dff8c r4:84513380 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06c9dc0 r5:00001000 r4:eda49000 r4:84ffea80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xea905fb0 to 0xea905ff8) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850e0b8c r4:850e0800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850e0b8c r4:84513580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509a400 r8:845135ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84513580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84513580 r8:8027ecf4 r7:ea905e60 r6:84513600 r5:8509a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea909fb0 to 0xea909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510aec0 INFO: task kworker/1:370:4017 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: ba198000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:371:4020 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:371 state:D stack:0 pid:4020 tgid:4020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea911d84 r8:00000002 r7:60000113 r6:ea911d8c r5:85099800 r4:85099800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85099800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea911e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84515400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85099800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0675000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e0f8c r4:850e0c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850e0f8c r4:84513680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85099800 r8:845136ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84513680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84513680 r8:8027ecf4 r7:ea909e60 r6:84513700 r5:85099800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea911fb0 to 0xea911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:372:4022 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:372 state:D stack:0 pid:4022 tgid:4022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea915d84 r8:00000002 r7:60000013 r6:ea915d8c r5:8509bc00 r4:8509bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8509bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea915e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845157c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8509bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ed000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8509bc00 r8:845137ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845153c0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: ba644000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84515580 r10:61c88647 r9:8509c800 r8:845138ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845154c0 Call trace: 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r4:00000000 r5:85e2bb8c r4:85e2b800 r4:84ffea80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d60: 800f0013 ffffffff r4:e06c9dc0 r5:00001000 r4:eda49000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:375:4028 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:375 state:D stack:0 pid:4028 tgid:4028 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea921d84 r8:00000002 r7:60000013 r6:ea921d8c r5:8509e000 r4:8509e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8509e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea921e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84515c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8509e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0751000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e1f8c r4:850e1c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850e1f8c r4:84513a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509e000 r8:84513aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84513a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84513a80 r8:8027ecf4 r7:ea91de60 r6:84513b00 r5:8509e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea921fb0 to 0xea921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845159c0 INFO: task kworker/1:375:4028 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: baced000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:eda49000 r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 task:kworker/1:376 state:D stack:0 pid:4030 tgid:4030 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8509b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8509b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea925e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84515d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8509b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0763000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e238c r4:850e2000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850e238c r4:84513b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509b000 r8:84513bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84513b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84513b80 r8:8027ecf4 r7:ea921e60 r6:84513c00 r5:8509b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea925fb0 to 0xea925ff8) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85e2bb8c r4:85e2b800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:e07ad000 r4:00000001 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829189c0 r9:ea92dd84 r8:00000002 r7:60000113 r6:ea92dd8c r5:850a0000 r5:850a0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea92de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510a340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0775000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e278c r4:850e2400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850e278c r4:84513d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a0000 r8:84513dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84513d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84513d80 r8:8027ecf4 r7:ea929e60 r6:84513e00 r5:850a0000 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84515f80 INFO: task kworker/1:378:4034 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea931e08 r4:00000000 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:850e2b8c r4:84513e80 r10:00000000 r9:84513e80 r8:8027ecf4 r7:ea929e60 r6:84513f00 r5:850a0c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bb28f000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:380:4039 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:380 state:D stack:0 pid:4039 tgid:4039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea939d84 r8:00000002 r7:60000013 r6:ea939d8c r5:850a2400 r4:850a2400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea939e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8451e440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07c3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e2f8c r4:850e2c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850e2f8c r4:84513f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a2400 r8:84513fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84513f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84513f80 r8:8027ecf4 r7:ea929e60 r6:84521000 r5:850a2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea939fb0 to 0xea939ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8451e040 INFO: task kworker/1:380:4039 is blocked on a mutex likely owned by task kworker/0:73:3846. Workqueue: events bpf_prog_free_deferred Exception stack(0xe06c9d20 to 0xe06c9d68) r4:82ac11e4 r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:77:4040 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:77 state:D stack:0 pid:4040 tgid:4040 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e88f5d84 r8:00000002 r7:60000113 r6:e88f5d8c r5:85090c00 r4:85090c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85090c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88f5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84520e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85090c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e484b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847ff38c r4:847ff000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:847ff38c r4:844c7680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85090c00 r8:844c76ac r7:82804d40 r6:dddced40 r5:dddced60 r4:844c7680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844c7680 r8:8027ecf4 r7:e06c5e60 r6:844c7700 r5:85090c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88f5fb0 to 0xe88f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84520b40 INFO: task kworker/0:77:4040 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bb6a0000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r4:e06c9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r5:00001000 r4:eda49000 r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 r4:84ffea80 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:381 state:D stack:0 pid:4042 tgid:4042 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea935d84 r8:00000002 r7:60000013 r6:ea935d8c r5:85091800 r4:85091800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85091800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea935e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8451e500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85091800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07cd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e338c r4:850e3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850e338c r4:84521080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85091800 r8:845210ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521080 r8:8027ecf4 r7:ea939e60 r6:844c7780 r5:85091800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea935fb0 to 0xea935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8451e400 INFO: task kworker/1:381:4042 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bb850000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85093000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:85093000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e378c r4:850e3400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850e378c r4:84521100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85093000 r8:8452112c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521100 r8:8027ecf4 r7:ea935e60 r6:844c7800 r5:85093000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea941fb0 to 0xea941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8451e540 INFO: task kworker/1:382:4044 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bb850000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:383:4046 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:383 state:D stack:0 pid:4046 tgid:4046 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea90dd84 r8:00000002 r7:60000013 r6:ea90dd8c r5:850a3000 r4:850a3000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea90de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8451ecc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea96d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec38c r4:850ec000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ec38c r4:84521180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a3000 r8:845211ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521180 r8:8027ecf4 r7:ea941e60 r6:84521200 r5:850a3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea90dfb0 to 0xea90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8451e600 INFO: task kworker/1:383:4046 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bb850000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:78:4048 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:78 state:D stack:0 pid:4048 tgid:4048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea945d84 r8:00000002 r7:60000113 r6:ea945d8c r5:85092400 r4:85092400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85092400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea945e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84520f00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85092400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e487d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506c38c r4:8506c000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506c38c r4:844c7880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:844c78ac r7:82804d40 r6:dddced40 r5:dddced60 r4:844c7880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844c7880 r8:8027ecf4 r7:e06c5e60 r6:844c7900 r5:85092400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea945fb0 to 0xea945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84520740 INFO: task kworker/0:78:4048 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bbd18000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:79:4050 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:79 state:D stack:0 pid:4050 tgid:4050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea949d84 r8:00000002 r7:60000113 r6:ea949d8c r5:85094800 r4:85094800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85094800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea949e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845180c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85094800 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea967000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e3f8c r4:850e3c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850e3f8c r4:844c7980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85094800 r8:844c79ac r7:82804d40 r6:dddced40 r5:dddced60 r4:844c7980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844c7980 r8:8027ecf4 r7:e06c5e60 r6:844c7a00 r5:85094800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea949fb0 to 0xea949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84520c00 INFO: task kworker/0:79:4050 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bbf16000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:80:4052 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:80 state:D stack:0 pid:4052 tgid:4052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea94dd84 r8:00000002 r7:60000113 r6:ea94dd8c r5:85095400 r4:85095400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85095400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea94de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84520300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85095400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea94f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506cb8c r4:8506c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506cb8c r4:844c7a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85095400 r8:844c7aac r7:82804d40 r6:dddced40 r5:dddced60 r4:844c7a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844c7a80 r8:8027ecf4 r7:ea949e60 r6:844c7b00 r5:85095400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea94dfb0 to 0xea94dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84520040 INFO: task kworker/0:80:4052 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bc11c000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:384:4054 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:384 state:D stack:0 pid:4054 tgid:4054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea93dd84 r8:00000002 r7:60000013 r6:ea93dd8c r5:85096000 r4:85096000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea93de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8451eb00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85096000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea955000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e3b8c r4:850e3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850e3b8c r4:84521280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85096000 r8:845212ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521280 r8:8027ecf4 r7:ea90de60 r6:844c7b80 r5:85096000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea93dfb0 to 0xea93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8451e900 INFO: task kworker/1:384:4054 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bc11c000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:81:4055 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:81 state:D stack:0 pid:4055 tgid:4055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea965d84 r8:00000002 r7:60000113 r6:ea965d8c r5:85096c00 r4:85096c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85096c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea965e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84518340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85096c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea97f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ec78c r4:850ec400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850ec78c r4:844c7c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85096c00 r8:844c7c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:844c7c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844c7c00 r8:8027ecf4 r7:ea949e60 r6:844c7c80 r5:85096c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea965fb0 to 0xea965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84520040 INFO: task kworker/0:81:4055 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bc350000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:385:4057 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:385 state:D stack:0 pid:4057 tgid:4057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea959d84 r8:00000002 r7:60000013 r6:ea959d8c r5:85093c00 r4:85093c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85093c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea959e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f7340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85093c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ecf8c r4:850ecc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ecf8c r4:84521300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85093c00 r8:8452132c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521300 r8:8027ecf4 r7:ea90de60 r6:844c7d00 r5:85093c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea959fb0 to 0xea959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8451eb80 INFO: task kworker/1:385:4057 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bc350000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:386:4060 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:386 state:D stack:0 pid:4060 tgid:4060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea971d84 r8:00000002 r7:60000113 r6:ea971d8c r5:850a5400 r4:850a5400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea971e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f7040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb39000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ecb8c r4:850ec800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ecb8c r4:84521380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a5400 r8:845213ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521380 r8:8027ecf4 r7:ea959e60 r6:84521400 r5:850a5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea971fb0 to 0xea971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8451ed40 INFO: task kworker/1:386:4060 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bc50b000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 9fa0: 00000000 00000000 00000000 00000000 r4:8500f640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bc893000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:83:4068 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:83 state:D stack:0 pid:4068 tgid:4068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9a9d84 r8:00000002 r7:60000113 r6:ea9a9d8c r5:850a3c00 r4:850a3c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84518600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9cb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506d78c r4:8506d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506d78c r4:844c7e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a3c00 r8:844c7e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:844c7e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844c7e00 r8:8027ecf4 r7:ea991e60 r6:84521500 r5:850a3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a9fb0 to 0xea9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84518640 INFO: task kworker/0:83:4068 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bc893000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:84:4069 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:84 state:D stack:0 pid:4069 tgid:4069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9add84 r8:00000002 r7:60000113 r6:ea9add8c r5:850a1800 r4:850a1800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ade08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84518740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa63000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506db8c r4:8506d800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506db8c r4:844c7e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a1800 r8:844c7eac r7:82804d40 r6:dddced40 r5:dddced60 r4:844c7e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844c7e80 r8:8027ecf4 r7:ea9a9e60 r6:84521580 r5:850a1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9adfb0 to 0xea9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84518640 INFO: task kworker/0:84:4069 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bcaec000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:85:4070 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:85 state:D stack:0 pid:4070 tgid:4070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9a5d84 r8:00000002 r7:60000113 r6:ea9a5d8c r5:84c7b000 r4:84c7b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c7b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84518dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c7b000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff3b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506e38c r4:8506e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506e38c r4:844c7f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c7b000 r8:844c7f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:844c7f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844c7f00 r8:8027ecf4 r7:ea9ade60 r6:844c7f80 r5:84c7b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a5fb0 to 0xea9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84518640 INFO: task kworker/0:85:4070 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bcaec000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:86:4072 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:86 state:D stack:0 pid:4072 tgid:4072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea989d84 r8:00000002 r7:60000113 r6:ea989d8c r5:85090000 r4:85090000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85090000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea989e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84518e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85090000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506e78c r4:8506e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506e78c r4:84da3000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85090000 r8:84da302c r7:82804d40 r6:dddced40 r5:dddced60 r4:84da3000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da3000 r8:8027ecf4 r7:ea9a5e60 r6:84da3080 r5:85090000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea989fb0 to 0xea989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84518640 INFO: task kworker/0:86:4072 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bcf70000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:387:4073 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:387 state:D stack:0 pid:4073 tgid:4073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9b1d84 r8:00000002 r7:60000013 r6:ea9b1d8c r5:84e6ec00 r4:84e6ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e6ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f7400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e6ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd11000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ed38c r4:850ed000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ed38c r4:84521600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e6ec00 r8:8452162c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521600 r8:8027ecf4 r7:ea959e60 r6:84da3100 r5:84e6ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b1fb0 to 0xea9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f75c0 INFO: task kworker/1:387:4073 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bcf70000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:388:4075 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:388 state:D stack:0 pid:4075 tgid:4075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9b5d84 r8:00000002 r7:60000013 r6:ea9b5d8c r5:8509ec00 r4:8509ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8509ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84518b00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8509ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd71000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506df8c r4:8506dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8506df8c r4:84521680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509ec00 r8:845216ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521680 r8:8027ecf4 r7:ea9b1e60 r6:84521700 r5:8509ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b5fb0 to 0xea9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f75c0 INFO: task kworker/1:388:4075 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bd2de000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:389:4077 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:389 state:D stack:0 pid:4077 tgid:4077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9b9d84 r8:00000002 r7:60000013 r6:ea9b9d8c r5:84c70000 r4:84c70000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c70000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f7a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c70000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfffd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850edb8c r4:850ed800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850edb8c r4:84521780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c70000 r8:845217ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521780 r8:8027ecf4 r7:ea9b5e60 r6:84da3180 r5:84c70000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b9fb0 to 0xea9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f75c0 INFO: task kworker/1:389:4077 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bd2de000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:390:4079 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:390 state:D stack:0 pid:4079 tgid:4079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9bdd84 r8:00000002 r7:60000113 r6:ea9bdd8c r5:84c70c00 r4:84c70c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c70c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9bde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f7700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c70c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ed78c r4:850ed400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ed78c r4:84521800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c70c00 r8:8452182c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521800 r8:8027ecf4 r7:ea9b9e60 r6:84da3200 r5:84c70c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9bdfb0 to 0xea9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f7440 INFO: task kworker/1:390:4079 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bd61e000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:391:4080 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:391 state:D stack:0 pid:4080 tgid:4080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea97dd84 r8:00000002 r7:60000013 r6:ea97dd8c r5:84c71800 r4:84c71800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c71800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea97de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f7cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c71800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e483d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ee38c r4:850ee000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ee38c r4:84521880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c71800 r8:845218ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521880 r8:8027ecf4 r7:ea9b9e60 r6:84da3280 r5:84c71800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea97dfb0 to 0xea97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f70c0 INFO: task kworker/1:391:4080 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bd88d000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:87:4082 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:87 state:D stack:0 pid:4082 tgid:4082 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9c1d84 r8:00000002 r7:60000113 r6:ea9c1d8c r5:84c72400 r4:84c72400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c72400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d90240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c72400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e006f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506ff8c r4:8506fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506ff8c r4:84da3300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c72400 r8:84da332c r7:82804d40 r6:dddced40 r5:dddced60 r4:84da3300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da3300 r8:8027ecf4 r7:ea989e60 r6:84da3380 r5:84c72400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c1fb0 to 0xea9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84518ec0 INFO: task kworker/0:87:4082 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bdba8000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:392:4085 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:392 state:D stack:0 pid:4085 tgid:4085 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9c9d84 r8:00000002 r7:60000013 r6:ea9c9d8c r5:84c73000 r4:84c73000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c73000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f7b00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c73000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0057000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850edf8c r4:850edc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850edf8c r4:84521900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c73000 r8:8452192c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521900 r8:8027ecf4 r7:ea97de60 r6:84da3400 r5:84c73000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c9fb0 to 0xea9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f7b40 INFO: task kworker/1:392:4085 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bdc2d000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:88:4088 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:88 state:D stack:0 pid:4088 tgid:4088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9cdd84 r8:00000002 r7:60000113 r6:ea9cdd8c r5:84c73c00 r4:84c73c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c73c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9cde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845062c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c73c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506eb8c r4:8506e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506eb8c r4:84da3480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c73c00 r8:84da34ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84da3480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da3480 r8:8027ecf4 r7:ea9c1e60 r6:84da3500 r5:84c73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9cdfb0 to 0xea9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845187c0 INFO: task kworker/0:88:4088 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bdc2d000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:393:4089 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:393 state:D stack:0 pid:4089 tgid:4089 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9d1d84 r8:00000002 r7:60000113 r6:ea9d1d8c r5:84c74800 r4:84c74800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c74800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f7d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c74800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4857000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ee78c r4:850ee400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ee78c r4:84521980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c74800 r8:845219ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521980 r8:8027ecf4 r7:ea97de60 r6:84da3580 r5:84c74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d1fb0 to 0xea9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f7c80 INFO: task kworker/1:393:4089 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: be0a5000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:394:4091 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:394 state:D stack:0 pid:4091 tgid:4091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9d5d84 r8:00000002 r7:60000013 r6:ea9d5d8c r5:84c75400 r4:84c75400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c75400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f7e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c75400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9d7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850eeb8c r4:850ee800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850eeb8c r4:84521a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c75400 r8:84521a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521a00 r8:8027ecf4 r7:ea9d1e60 r6:84da3600 r5:84c75400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d5fb0 to 0xea9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f7dc0 INFO: task kworker/1:394:4091 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: be0a5000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:395:4093 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:395 state:D stack:0 pid:4093 tgid:4093 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9e5d84 r8:00000002 r7:60000013 r6:ea9e5d8c r5:84c76000 r4:84c76000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c76000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845154c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c76000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ef38c r4:850ef000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ef38c r4:84521a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c76000 r8:84521aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521a80 r8:8027ecf4 r7:ea9d5e60 r6:84da3680 r5:84c76000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e5fb0 to 0xea9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f7c00 INFO: task kworker/1:395:4093 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: be0a5000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84c76c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ede08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8451efc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c76c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9dd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850eef8c r4:850eec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850eef8c r4:84521b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c76c00 r8:84521b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521b00 r8:8027ecf4 r7:ea9e5e60 r6:84da3700 r5:84c76c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9edfb0 to 0xea9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8451e880 INFO: task kworker/1:396:4094 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: be8ea000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:89:4097 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:89 state:D stack:0 pid:4097 tgid:4097 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9c5d84 r8:00000002 r7:60000113 r6:ea9c5d8c r5:850b8000 r4:850b8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84506740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa2b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506ef8c r4:8506ec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506ef8c r4:84da3780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b8000 r8:84da37ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84da3780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da3780 r8:8027ecf4 r7:ea9c1e60 r6:84da3800 r5:850b8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c5fb0 to 0xea9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84506280 INFO: task kworker/0:89:4097 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bea83000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:397 state:D stack:0 pid:4099 tgid:4099 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:850b8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa09e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510f240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa11000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850efb8c r4:850ef800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850efb8c r4:84521b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b8c00 r8:84521bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521b80 r8:8027ecf4 r7:ea9e5e60 r6:84da3880 r5:850b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa09fb0 to 0xeaa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f7f80 INFO: task kworker/1:397:4099 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bf39b000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:398:4101 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:398 state:D stack:0 pid:4101 tgid:4101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa15d84 r8:00000002 r7:60000013 r6:eaa15d8c r5:850b9800 r4:850b9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa15e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510f000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ef78c r4:850ef400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ef78c r4:84521c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b9800 r8:84521c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521c00 r8:8027ecf4 r7:eaa09e60 r6:84da3900 r5:850b9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa15fb0 to 0xeaa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510f140 INFO: task kworker/1:398:4101 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bf39b000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:399:4102 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:399 state:D stack:0 pid:4102 tgid:4102 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa21d84 r8:00000002 r7:60000113 r6:eaa21d8c r5:850ba400 r4:850ba400 r5:850ba400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa21e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510f580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa31000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c038c r4:851c0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c038c r4:84521c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ba400 r8:84521cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521c80 r8:8027ecf4 r7:eaa09e60 r6:84da3980 r5:850ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa21fb0 to 0xeaa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510f0c0 INFO: task kworker/1:399:4102 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bf39b000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:850bb000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850bb000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa29e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510f340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa1d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850eff8c r4:850efc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850eff8c r4:84521d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850bb000 r8:84521d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521d00 r8:8027ecf4 r7:eaa21e60 r6:84da3a00 r5:850bb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa29fb0 to 0xeaa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510f2c0 INFO: task kworker/1:400:4105 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bf39b000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:90:4106 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:90 state:D stack:0 pid:4106 tgid:4106 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa01d84 r8:00000002 r7:60000113 r6:eaa01d8c r5:850bbc00 r4:850bbc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850bbc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa01e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84506e00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa87000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506f38c r4:8506f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506f38c r4:84da3a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850bbc00 r8:84da3aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84da3a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da3a80 r8:8027ecf4 r7:ea9c1e60 r6:84da3b00 r5:850bbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa01fb0 to 0xeaa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84506700 INFO: task kworker/0:90:4106 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bf39b000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:401:4109 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:401 state:D stack:0 pid:4109 tgid:4109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829189c0 r9:eaa41d84 r8:00000002 r7:60000013 r6:eaa41d8c r5:850bd400 r5:850bd400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510f600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa43000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c078c r4:851c0400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c078c r4:84521d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850bd400 r8:84521dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521d80 r8:8027ecf4 r7:eaa21e60 r6:84da3b80 r5:850bd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa41fb0 to 0xeaa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510f540 INFO: task kworker/1:401:4109 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bf39b000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:402:4111 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:402 state:D stack:0 pid:4111 tgid:4111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa55d84 r8:00000002 r7:60000113 r6:eaa55d8c r5:850bc800 r4:850bc800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850bc800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa55e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510f700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c0b8c r4:851c0800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c0b8c r4:84521e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850bc800 r8:84521e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521e00 r8:8027ecf4 r7:eaa41e60 r6:84da3c00 r5:850bc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa55fb0 to 0xeaa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510f6c0 INFO: task kworker/1:402:4111 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: bf9d6000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:403:4113 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:403 state:D stack:0 pid:4113 tgid:4113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa5dd84 r8:00000002 r7:60000113 r6:eaa5dd8c r5:84ec8000 r4:84ec8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ec8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa5de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510f900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ec8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa63000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c0f8c r4:851c0c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c0f8c r4:84521e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ec8000 r8:84521eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06c9d20 to 0xe06c9d68) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:404:4114 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:404 state:D stack:0 pid:4114 tgid:4114 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa61d84 r8:00000002 r7:60000113 r6:eaa61d8c r5:84ec8c00 r4:84ec8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ec8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa61e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510f9c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ec8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa69000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c138c r4:851c1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c138c r4:84521f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ec8c00 r8:84521f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521f00 r8:8027ecf4 r7:eaa5de60 r6:84da3d00 r5:84ec8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa61fb0 to 0xeaa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510f6c0 INFO: task kworker/1:404:4114 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c00d8000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:405:4117 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:405 state:D stack:0 pid:4117 tgid:4117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa75d84 r8:00000002 r7:60000013 r6:eaa75d8c r5:84eca400 r4:84eca400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84eca400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa75e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510fd00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84eca400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa7d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c1b8c r4:851c1800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c1b8c r4:84521f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84eca400 r8:84521fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84521f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84521f80 r8:8027ecf4 r7:eaa61e60 r6:84da3d80 r5:84eca400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa75fb0 to 0xeaa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510fa00 INFO: task kworker/1:405:4117 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c00d8000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:406:4118 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:406 state:D stack:0 pid:4118 tgid:4118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa81d84 r8:00000002 r7:60000013 r6:eaa81d8c r5:84ecb000 r4:84ecb000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ecb000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa81e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510fc00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ecb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa77000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c178c r4:851c1400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c178c r4:8450f000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ecb000 r8:8450f02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8450f000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8450f000 r8:8027ecf4 r7:eaa75e60 r6:84da3e00 r5:84ecb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa81fb0 to 0xeaa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510fa00 INFO: task kworker/1:406:4118 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c0607000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:407:4121 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:407 state:D stack:0 pid:4121 tgid:4121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa59d84 r8:00000002 r7:60000113 r6:eaa59d8c r5:850a4800 r4:850a4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa59e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510fe80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa8d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c1f8c r4:851c1c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c1f8c r4:8450f080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a4800 r8:8450f0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8450f080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8450f080 r8:8027ecf4 r7:eaa75e60 r6:8450f100 r5:850a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa59fb0 to 0xeaa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510fac0 INFO: task kworker/1:407:4121 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c0972000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:91:4123 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:91 state:D stack:0 pid:4123 tgid:4123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa35d84 r8:00000002 r7:60000113 r6:eaa35d8c r5:850a6000 r4:850a6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa35e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d900c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe8d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506fb8c r4:8506f800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506fb8c r4:84da3e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a6000 r8:84da3eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84da3e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da3e80 r8:8027ecf4 r7:ea9c1e60 r6:8450f180 r5:850a6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa35fb0 to 0xeaa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84506dc0 INFO: task kworker/0:91:4123 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c0972000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829189c0 r9:eaa3dd84 r8:00000002 r7:60000013 r6:eaa3dd8c r5:85098000 r4:85098000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85098000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa3de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8451eec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85098000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df841000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c238c r4:851c2000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c238c r4:8450f200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85098000 r8:8450f22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8450f200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8450f200 r8:8027ecf4 r7:eaa59e60 r6:8450f280 r5:85098000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510fdc0 INFO: task kworker/1:408:4125 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c0f13000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:409:4127 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:409 state:D stack:0 pid:4127 tgid:4127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa99d84 r8:00000002 r7:60000013 r6:eaa99d8c r5:85118000 r4:85118000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85118000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa99e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b6040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85118000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ed000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c278c r4:851c2400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c278c r4:8450f300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85118000 r8:8450f32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8450f300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8450f300 r8:8027ecf4 r7:eaa3de60 r6:8450f380 r5:85118000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa99fb0 to 0xeaa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510fc80 INFO: task kworker/1:409:4127 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c0f13000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:410:4129 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:410 state:D stack:0 pid:4129 tgid:4129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e8885d84 r8:00000002 r7:60000113 r6:e8885d8c r5:85119800 r4:85119800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85119800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8885e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b62c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85119800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbc3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c2b8c r4:851c2800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c2b8c r4:8450f400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85119800 r8:8450f42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8450f400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8450f400 r8:8027ecf4 r7:eaa99e60 r6:8450f480 r5:85119800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8885fb0 to 0xe8885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b6100 INFO: task kworker/1:410:4129 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c13bb000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:411:4130 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:411 state:D stack:0 pid:4130 tgid:4130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa9dd84 r8:00000002 r7:60000113 r6:eaa9dd8c r5:8511b000 r4:8511b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8511b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa9de08 r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851c2f8c r4:851c2c00 r4:8450f500 dfa0: 00000000 00000000 00000000 00000000 Exception stack(0xe06c9d20 to 0xe06c9d68) r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:92:4134 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:92 state:D stack:0 pid:4134 tgid:4134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaaadd84 r8:00000002 r7:60000013 r6:eaaadd8c r5:8511bc00 r4:8511bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8511bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaade08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521b840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8511bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa17000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516438c r4:85164000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516438c r4:84da3f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8511bc00 r8:84da3f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84da3f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da3f00 r8:8027ecf4 r7:ea9c1e60 r6:8450f600 r5:8511bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaadfb0 to 0xeaaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d901c0 INFO: task kworker/0:92:4134 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c17cd000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85e2bb8c r4:85e2b800 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8511a400 r5:8511a400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d90b00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8511a400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e050b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c0478c r4:84c04400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c0478c r4:84da3f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8511a400 r8:84da3fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84da3f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84da3f80 r8:8027ecf4 r7:eaaade60 r6:84d9a000 r5:8511a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab1fb0 to 0xeaab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d901c0 INFO: task kworker/0:93:4135 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c17cd000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ecd400 r5:84ecd400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84ecec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b6900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ecec00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c338c r4:851c3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c338c r4:8450f700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ecec00 r8:8450f72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8450f700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8450f700 r8:8027ecf4 r7:eaaa1e60 r6:84d9a100 r5:84ecec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab9fb0 to 0xeaab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b6940 INFO: task kworker/1:413:4140 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c208c000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84ecc800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:851c378c r4:8450f780 Exception stack(0xeaabdfb0 to 0xeaabdff8) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06c9dc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:415:4143 blocked for more than 455 seconds. r5:84ec9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b6b40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ec9800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04a9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c3b8c r4:851c3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c3b8c r4:8450f880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ec9800 r8:8450f8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8450f880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8450f880 r8:8027ecf4 r7:eaaa1e60 r6:84d9a200 r5:84ec9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac5fb0 to 0xeaac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b6d00 INFO: task kworker/1:415:4143 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c2464000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:416:4145 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:84ecbc00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaacdfb0 to 0xeaacdff8) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06c9dc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:417:4146 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:417 state:D stack:0 pid:4146 tgid:4146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaad1d84 r8:00000002 r7:60000013 r6:eaad1d8c r5:850bec00 r4:850bec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850bec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b6600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c478c r4:851c4400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c478c r4:8450f900 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c296f000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:850be000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d90d40 r10:61c88647 r9:850be000 r8:84d9a3ac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06c9d20 to 0xe06c9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06c9fb0 to 0xe06c9ff8) INFO: task kworker/1:418:4152 blocked for more than 455 seconds. r5:85188000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851c4f8c r4:851c4c00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r5:85e2bb8c r4:85e2b800 r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:419:4155 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:419 state:D stack:0 pid:4155 tgid:4155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e4869d84 r8:00000002 r7:60000013 r6:e4869d8c r5:85188c00 r4:85188c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85188c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4869e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f5040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85188c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0639000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c4b8c r4:851c4800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c4b8c r4:8450fa00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85188c00 r8:8450fa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8450fa00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8450fa00 r8:8027ecf4 r7:eaad5e60 r6:84d9a500 r5:85188c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4869fb0 to 0xe4869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f5100 INFO: task kworker/1:419:4155 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:95:4156 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:95 state:D stack:0 pid:4156 tgid:4156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaaddd84 r8:00000002 r7:60000113 r6:eaaddd8c r5:85189800 r4:85189800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85189800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaadde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521b740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85189800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9b7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c04f8c r4:84c04c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c04f8c r4:84d9a580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85189800 r8:84d9a5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84d9a580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d9a580 r8:8027ecf4 r7:eaaade60 r6:84d9a600 r5:85189800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaddfb0 to 0xeaaddff8) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c3384000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe06c9fb0 to 0xe06c9ff8) INFO: task kworker/1:420:4158 blocked for more than 455 seconds. r5:8511c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f5300 r10:61c88647 r9:8511c800 r8:8450faac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:844f51c0 Call trace: 9d60: 800f0013 ffffffff r4:e06c9dc0 r5:00001000 r4:eda49000 r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8511e000 r5:8511e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f5580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8511e000 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c5b8c r4:851c5800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c5b8c r4:8450fb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8511e000 r8:8450fbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8450fb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8450fb80 r8:8027ecf4 r7:eaad9e60 r6:8450fc00 r5:8511e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae1fb0 to 0xeaae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f5280 INFO: task kworker/1:421:4160 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c3a48000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85e2bb8c r4:85e2b800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8511ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae5fb0 to 0xeaae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f5480 INFO: task kworker/1:422:4162 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c3c14000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 Exception stack(0xe06c9fb0 to 0xe06c9ff8) INFO: task kworker/1:423:4164 blocked for more than 455 seconds. r5:8511d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f5940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8511d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcd9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c638c r4:851c6000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c638c r4:8450fd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8511d400 r8:8450fdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8450fd80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r4:84ffea80 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:424 state:D stack:0 pid:4166 tgid:4166 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85118c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xea995fb0 to 0xea995ff8) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84ece000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea99de08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c45a4000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:426:4170 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:426 state:D stack:0 pid:4170 tgid:4170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa39d84 r8:00000002 r7:60000013 r6:eaa39d8c r5:85140000 r4:85140000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85140000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa39e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f5c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85140000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfef5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c6b8c r4:851c6800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c6b8c r4:84511080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85140000 r8:845110ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84511080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84511080 r8:8027ecf4 r7:ea99de60 r6:84511100 r5:85140000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa39fb0 to 0xeaa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f5900 INFO: task kworker/1:426:4170 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c47f8000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85140c00 r5:85140c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa4de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f5c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85140c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c6f8c r4:851c6c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c6f8c r4:84511180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85140c00 r8:845111ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84511180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84511180 r8:8027ecf4 r7:eaa39e60 r6:84511200 r5:85140c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa4dfb0 to 0xeaa4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff r4:e06c9dc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85141800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f5f00 r7:ddde2d40 r6:83018200 r5:851c738c r4:84511280 Exception stack(0xeaa6dfb0 to 0xeaa6dff8) Workqueue: events bpf_prog_free_deferred 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85142400 r5:85142400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84511380 Exception stack(0xeaaedfb0 to 0xeaaedff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f5d40 INFO: task kworker/1:429:4175 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c4eb4000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:430:4179 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:430 state:D stack:0 pid:4179 tgid:4179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaaf1d84 r8:00000002 r7:60000113 r6:eaaf1d8c r5:85143000 r4:85143000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85143000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d93040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84511480 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800f0013 r4:80239bb0 r4:e06c9dc0 r4:00000000 r5:85e2bb8c r4:85e2b800 r4:84ffea80 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:431 state:D stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85143c00 r4:829189bc r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851c7b8c r4:851c7800 r4:84511580 Exception stack(0xeaaf5fb0 to 0xeaaf5ff8) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:432:4182 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:432 state:D stack:0 pid:4182 tgid:4182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaaf9d84 r8:00000002 r7:60000013 r6:eaaf9d8c r5:85144800 r4:85144800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85144800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d93680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85144800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07cb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d078c r4:851d0400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d078c r4:84511680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85144800 r8:845116ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84511680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84511680 r8:8027ecf4 r7:eaaede60 r6:84511700 r5:85144800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf9fb0 to 0xeaaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d93480 INFO: task kworker/1:432:4182 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c5af3000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:433:4184 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:433 state:D stack:0 pid:4184 tgid:4184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaafdd84 r8:00000002 r7:60000013 r6:eaafdd8c r5:85145400 r4:85145400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85145400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaafde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d934c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85145400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07bb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d038c r4:851d0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d038c r4:84511780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85145400 r8:845117ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84511780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84511780 r8:8027ecf4 r7:eaaf9e60 r6:84511800 r5:85145400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaafdfb0 to 0xeaafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d93400 INFO: task kworker/1:433:4184 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 INFO: task kworker/1:434:4186 blocked for more than 456 seconds. r5:85146000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d93b80 r5:851d138c r4:851d1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d138c r4:84511880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85146000 r8:845118ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84511880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84511880 r8:8027ecf4 r7:eaaf9e60 r6:84511900 r5:85146000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab01fb0 to 0xeab01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d93400 INFO: task kworker/1:434:4186 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c5c77000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8500f640 Workqueue: events bpf_prog_free_deferred r5:85146c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab05e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84511980 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:436:4189 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:436 state:D stack:0 pid:4189 tgid:4189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab0dd84 r8:00000002 r7:60000113 r6:eab0dd8c r5:85148000 r4:85148000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85148000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab0de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d93980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85148000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4843000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d0f8c r4:851d0c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d0f8c r4:84511a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85148000 r8:84511aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84511a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84511a80 r8:8027ecf4 r7:eab01e60 r6:84511b00 r5:85148000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab0dfb0 to 0xeab0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eab19d84 r8:00000002 r7:60000113 r6:eab19d8c r5:8518a400 r5:8518a400 r4:829189bc r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84511b80 r8:8027ecf4 r7:eab01e60 r6:84d9a680 r5:8518a400 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:00001000 r4:eda49000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:438:4193 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:438 state:D stack:0 pid:4193 tgid:4193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab09d84 r8:00000002 r7:60000113 r6:eab09d8c r5:85148c00 r4:85148c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85148c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab09e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d93c80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85148c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e487b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d178c r4:851d1400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d178c r4:84511c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85148c00 r8:84511c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84511c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84511c00 r8:8027ecf4 r7:eab19e60 r6:84511c80 r5:85148c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab09fb0 to 0xeab09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d93dc0 INFO: task kworker/1:438:4193 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c624e000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r4:85149800 r5:85149800 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab15e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84511d00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:440:4197 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:440 state:D stack:0 pid:4197 tgid:4197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab11d84 r8:00000002 r7:60000113 r6:eab11d8c r5:8514a400 r4:8514a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8514a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab11e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d90840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e889b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d1f8c r4:851d1c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d1f8c r4:84511e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514a400 r8:84511e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84511e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84511e00 r8:8027ecf4 r7:eab15e60 r6:84511e80 r5:8514a400 r4:00000001 Exception stack(0xeab11fb0 to 0xeab11ff8) INFO: task kworker/1:440:4197 is blocked on a mutex likely owned by task kworker/0:73:3846. r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c6535000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8514b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8452c140 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:442:4201 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:442 state:D stack:0 pid:4201 tgid:4201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab25d84 r8:00000002 r7:60000113 r6:eab25d8c r5:8514c800 r4:8514c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8514c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab25e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8452c3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514c800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88c1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d2b8c r4:851d2800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d2b8c r4:851fd000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514c800 r8:851fd02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fd000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd000 r8:8027ecf4 r7:eab21e60 r6:851fd080 r5:8514c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab25fb0 to 0xeab25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8452c200 INFO: task kworker/1:442:4201 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:8514e000 r4:829189bc r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:851fd100 r8:8027ecf4 r7:eab25e60 r6:851fd180 r5:8514e000 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84ffea80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:444 state:D stack:0 pid:4205 tgid:4205 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8514bc00 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8452c780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88d9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d2f8c r4:851d2c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d2f8c r4:851fd200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514bc00 r8:851fd22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fd200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd200 r8:8027ecf4 r7:eab2de60 r6:851fd280 r5:8514bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab35fb0 to 0xeab35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8452c380 INFO: task kworker/1:444:4205 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c6e02000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:445:4209 blocked for more than 456 seconds. r4:8514d400 r5:8514d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:8514d400 r8:851fd32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r4:8514ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8514ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab39e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8452cb00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea953000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d3b8c r4:851d3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d3b8c r4:851fd400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514ec00 r8:851fd42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fd400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd400 r8:8027ecf4 r7:eab31e60 r6:851fd480 r5:8514ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab39fb0 to 0xeab39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8452c940 INFO: task kworker/1:446:4211 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c726e000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84ffea80 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:447 state:D stack:0 pid:4212 tgid:4212 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab29d84 r8:00000002 r7:60000013 r6:eab29d8c r5:85120000 r4:85120000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85120000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab29e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8452cd00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85120000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea969000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829189c0 r9:eab3dd84 r8:00000002 r7:60000013 r6:eab3dd8c r5:85120c00 r5:85120c00 r4:829189bc r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85120c00 r8:851fd62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:449:4217 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:449 state:D stack:0 pid:4217 tgid:4217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab45d84 r8:00000002 r7:60000113 r6:eab45d8c r5:85121800 r4:85121800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85121800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab45e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd21c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85121800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea98b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d878c r4:851d8400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d878c r4:851fd700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85121800 r8:851fd72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fd700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd700 r8:8027ecf4 r7:eab3de60 r6:851fd780 r5:85121800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab45fb0 to 0xeab45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dd2480 INFO: task kworker/1:449:4217 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c76ad000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r5:00001000 r4:eda49000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85122400 r4:829189bc r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85122400 r8:851fd82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:450:4219 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c76ad000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:451:4221 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:451 state:D stack:0 pid:4221 tgid:4221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab4dd84 r8:00000002 r7:60000113 r6:eab4dd8c r5:85123000 r4:85123000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85123000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85123000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea99f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:851fd900 dfa0: 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:eda49000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85123c00 r4:829189bc r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85123c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d938c r4:851d9000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d938c r4:851fda00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85123c00 r8:851fda2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fda00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fda00 r8:8027ecf4 r7:eab49e60 r6:851fda80 r5:85123c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab51fb0 to 0xeab51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85206180 INFO: task kworker/1:452:4223 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c7ac3000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:453:4226 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:85124800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:85125400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:851d9b8c r4:851d9800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06c9d20 to 0xe06c9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:455:4229 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:455 state:D stack:0 pid:4229 tgid:4229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab5dd84 r8:00000002 r7:60000113 r6:eab5dd8c r5:85126000 r4:85126000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85126000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab5de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85126000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa6f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851dab8c r4:851da800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851dab8c r4:851fdd00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85126000 r8:851fdd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fdd00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fdd00 r8:8027ecf4 r7:eab41e60 r6:851fdd80 r5:85126000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab5dfb0 to 0xeab5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852068c0 INFO: task kworker/1:455:4229 is blocked on a mutex likely owned by task kworker/0:73:3846. r4:00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:8518bc00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab69e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8518bc00 r8:851fde2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:457:4234 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:457 state:D stack:0 pid:4234 tgid:4234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab75d84 r8:00000002 r7:60000113 r6:eab75d8c r5:8518b000 r4:8518b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8518b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab75e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8518b000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa45000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851da38c r4:851da000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851da38c r4:851fde80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8518b000 r8:851fdeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fde80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fde80 r8:8027ecf4 r7:eab5de60 r6:84d9a780 r5:8518b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r4:84ffea80 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:458:4236 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:458 state:D stack:0 pid:4236 tgid:4236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab7dd84 r8:00000002 r7:60000113 r6:eab7dd8c r5:8518e000 r4:8518e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8518e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab7de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8518e000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa51000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c8b18000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:459:4237 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 r10:829189c0 r9:eab81d84 r8:00000002 r7:60000113 r6:eab81d8c r5:8518c800 r5:8518c800 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeab81fb0 to 0xeab81ff8) r4:852069c0 Call trace: 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:460 state:D stack:0 pid:4239 tgid:4239 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84d08000 r4:829189bc r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84d08000 r8:8521702c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c8d8f000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:461:4241 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:461 state:D stack:0 pid:4241 tgid:4241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab8dd84 r8:00000002 r7:60000113 r6:eab8dd8c r5:84d08c00 r4:84d08c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d08c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab8de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84d08c00 r8:852170ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r4:84ffea80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84d09800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeab91fb0 to 0xeab91ff8) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c91d4000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:463:4245 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:463 state:D stack:0 pid:4245 tgid:4245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaba1d84 r8:00000002 r7:60000113 r6:eaba1d8c r5:84d0a400 r4:84d0a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d0a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba1e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:463:4245 is blocked on a mutex likely owned by task kworker/0:73:3846. r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84d0bc00 r4:829189bc r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:97:4250 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:97 state:D stack:0 pid:4250 tgid:4250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaba9d84 r8:00000002 r7:60000013 r6:eaba9d8c r5:85128000 r4:85128000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85128000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521ba80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85128000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc59000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516478c r4:85164400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516478c r4:84d9ac00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85128000 r8:84d9ac2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84d9ac00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d9ac00 r8:8027ecf4 r7:eab65e60 r6:85217200 r5:85128000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba9fb0 to 0xeaba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8521b7c0 INFO: task kworker/0:97:4250 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c9986000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r5:00001000 r4:eda49000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85129800 r4:829189bc r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeabadfb0 to 0xeabadff8) Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff r4:e06c9dc0 r5:00001000 r4:eda49000 r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8512a400 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab61e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521bc00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8512a400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0395000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85164b8c r4:85164800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85164b8c r4:84d9ac80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512a400 r8:84d9acac r7:82804d40 r6:dddced40 r5:dddced60 r4:84d9ac80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d9ac80 r8:8027ecf4 r7:eab65e60 r6:85217380 r5:8512a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab61fb0 to 0xeab61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8521bb00 INFO: task kworker/0:98:4254 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: c9b49000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8512b000 r5:8512b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:851e4f8c r4:851e4c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:465:4255 is blocked on a mutex likely owned by task kworker/0:73:3846. [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:eda49000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8500f640 Workqueue: events bpf_prog_free_deferred r5:8512bc00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb5e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:99:4258 is blocked on a mutex likely owned by task kworker/0:73:3846. r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:100:4260 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:100 state:D stack:0 pid:4260 tgid:4260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eabb9d84 r8:00000002 r7:60000113 r6:eabb9d8c r5:8512c800 r4:8512c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8512c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521bf00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8512c800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04fb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516578c r4:85165400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516578c r4:84d9ad80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512c800 r8:84d9adac r7:82804d40 r6:dddced40 r5:dddced60 r4:84d9ad80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d9ad80 r8:8027ecf4 r7:eabb5e60 r6:85217580 r5:8512c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb9fb0 to 0xeabb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8521be00 INFO: task kworker/0:100:4260 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: ca1d4000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r4:84ffea80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8512d400 r5:8512d400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d9ae00 r8:8027ecf4 r7:eabb9e60 r6:85217600 r5:8512d400 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06c9dc0 r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:102:4264 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:102 state:D stack:0 pid:4264 tgid:4264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eabc1d84 r8:00000002 r7:60000013 r6:eabc1d8c r5:8512e000 r4:8512e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8512e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85220d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8512e000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabed000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85166b8c r4:85166800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:102:4264 is blocked on a mutex likely owned by task kworker/0:73:3846. 9d60: 800f0013 ffffffff r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r4:84ffea80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84d0d400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85165f8c r4:84d9af00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84d0c800 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabcde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d0c800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0687000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e4b8c r4:851e4800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e4b8c r4:85217700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d0c800 r8:8521772c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85217700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85217700 r8:8027ecf4 r7:eabb1e60 r6:85223000 r5:84d0c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabcdfb0 to 0xeabcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85219b00 INFO: task kworker/1:466:4267 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: ca96e000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84ffea80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84d0ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cb172000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:467:4272 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829189c0 r9:eabddd84 r8:00000002 r7:60000013 r6:eabddd8c r5:8518d400 r5:8518d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85217780 r8:8027ecf4 r7:eabb1e60 r6:85223180 r5:8518d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabddfb0 to 0xeabddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85219d80 INFO: task kworker/1:467:4272 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cb172000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8518ec00 r5:8518ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:105:4275 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:105 state:D stack:0 pid:4275 tgid:4275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eabe5d84 r8:00000002 r7:60000113 r6:eabe5d8c r5:84d0e000 r4:84d0e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d0e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe5e08 r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8516678c r4:85223280 Exception stack(0xeabe5fb0 to 0xeabe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85220540 INFO: task kworker/0:105:4275 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cb6ec000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:469:4277 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:469 state:D stack:0 pid:4277 tgid:4277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eabf1d84 r8:00000002 r7:60000113 r6:eabf1d8c r5:85130c00 r4:85130c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85130c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:dfaa7000 r7:ddde2d40 r6:83018200 r5:851e5b8c r4:85217880 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85130000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8516778c r4:85223400 5fa0: 00000000 00000000 00000000 00000000 Call trace: 9d60: 800f0013 ffffffff r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:107:4281 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:107 state:D stack:0 pid:4281 tgid:4281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac05d84 r8:00000002 r7:60000113 r6:eac05d8c r5:85131800 r4:85131800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85131800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac05e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85220e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85131800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 r7:dddced40 r6:83018000 r5:85166f8c r4:85223500 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:e06c9dc0 r5:00001000 r4:eda49000 r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eabe9d84 r8:00000002 r7:60000113 r6:eabe9d8c r5:85133000 r4:85133000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85133000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85220100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85133000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac01000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516738c r4:85167000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516738c r4:85223600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85133000 r8:8522362c r7:82804d40 r6:dddced40 r5:dddced60 r4:85223600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223600 r8:8027ecf4 r7:eabf5e60 r6:85223680 r5:85133000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe9fb0 to 0xeabe9ff8) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:108:4284 is blocked on a mutex likely owned by task kworker/0:73:3846. r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85133c00 r5:85133c00 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe06c9d20 to 0xe06c9d68) r4:00000000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:110:4287 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:110 state:D stack:0 pid:4287 tgid:4287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab79d84 r8:00000002 r7:60000113 r6:eab79d8c r5:85134800 r4:85134800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85134800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab79e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85224000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85134800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac11000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85167b8c r4:85167800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85167b8c r4:85223800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85134800 r8:8522382c r7:82804d40 r6:dddced40 r5:dddced60 r4:85223800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223800 r8:8027ecf4 r7:eabc9e60 r6:85223880 r5:85134800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab79fb0 to 0xeab79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85224140 INFO: task kworker/0:110:4287 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cc1ea000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:111:4290 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:111 state:D stack:0 pid:4290 tgid:4290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac15d84 r8:00000002 r7:60000013 r6:eac15d8c r5:85135400 r4:85135400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85135400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac15e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85224280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85135400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac25000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517038c r4:85170000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8517038c r4:85223900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85135400 r8:8522392c r7:82804d40 r6:dddced40 r5:dddced60 r4:85223900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223900 r8:8027ecf4 r7:eabc9e60 r6:85223980 r5:85135400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac15fb0 to 0xeac15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85224180 INFO: task kworker/0:111:4290 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cc2e8000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:112:4293 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:112 state:D stack:0 pid:4293 tgid:4293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac29d84 r8:00000002 r7:60000113 r6:eac29d8c r5:85136c00 r4:85136c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85136c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac29e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523c740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85136c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead0d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85170f8c r4:85170c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85170f8c r4:85223a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85136c00 r8:85223a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85223a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223a00 r8:8027ecf4 r7:eac15e60 r6:85223a80 r5:85136c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac29fb0 to 0xeac29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852242c0 INFO: task kworker/0:112:4293 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cc6db000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:113:4294 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:113 state:D stack:0 pid:4294 tgid:4294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac1dd84 r8:00000002 r7:60000113 r6:eac1dd8c r5:85132400 r4:85132400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85132400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac1de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85224480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85132400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac33000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517078c r4:85170400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8517078c r4:85223b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85132400 r8:85223b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85223b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223b00 r8:8027ecf4 r7:eac29e60 r6:85223b80 r5:85132400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac1dfb0 to 0xeac1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852242c0 INFO: task kworker/0:113:4294 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cca9a000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:470:4298 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:470 state:D stack:0 pid:4298 tgid:4298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac41d84 r8:00000002 r7:60000113 r6:eac41d8c r5:851a0000 r4:851a0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac41e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852149c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e483b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e7b8c r4:851e7800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e7b8c r4:85217a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a0000 r8:85217aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85217a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85217a80 r8:8027ecf4 r7:eabdde60 r6:85223c00 r5:851a0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac41fb0 to 0xeac41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85214100 INFO: task kworker/1:470:4298 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cca9a000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:471:4299 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:471 state:D stack:0 pid:4299 tgid:4299 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac45d84 r8:00000002 r7:60000013 r6:eac45d8c r5:851a0c00 r4:851a0c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a0c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214200 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e638c r4:851e6000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e638c r4:85217b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a0c00 r8:85217b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85217b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85217b00 r8:8027ecf4 r7:eac41e60 r6:85223c80 r5:851a0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac45fb0 to 0xeac45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852143c0 INFO: task kworker/1:471:4299 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: ccdc6000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:472:4301 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:472 state:D stack:0 pid:4301 tgid:4301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac4dd84 r8:00000002 r7:60000113 r6:eac4dd8c r5:851a2400 r4:851a2400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac4de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e678c r4:851e6400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e678c r4:85217b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a2400 r8:85217bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85217b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85217b80 r8:8027ecf4 r7:eac41e60 r6:85223d00 r5:851a2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac4dfb0 to 0xeac4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85214240 INFO: task kworker/1:472:4301 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: ccdc6000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:114:4303 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:114 state:D stack:0 pid:4303 tgid:4303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac55d84 r8:00000002 r7:60000113 r6:eac55d8c r5:851a3c00 r4:851a3c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac55e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523c840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead07000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85170b8c r4:85170800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85170b8c r4:85223d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:85223dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85223d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85223d80 r8:8027ecf4 r7:eac29e60 r6:85223e00 r5:851a3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac55fb0 to 0xeac55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85224c80 INFO: task kworker/0:114:4303 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: ccf40000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:473:4304 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:473 state:D stack:0 pid:4304 tgid:4304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac59d84 r8:00000002 r7:60000113 r6:eac59d8c r5:851a4800 r4:851a4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e005f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e6b8c r4:851e6800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e6b8c r4:85217c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a4800 r8:85217c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85217c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85217c00 r8:8027ecf4 r7:eac41e60 r6:85223e80 r5:851a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac59fb0 to 0xeac59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85214680 INFO: task kworker/1:473:4304 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cd398000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:474:4306 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:474 state:D stack:0 pid:4306 tgid:4306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac61d84 r8:00000002 r7:60000113 r6:eac61d8c r5:851a3000 r4:851a3000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac61e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e077d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e6f8c r4:851e6c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e6f8c r4:85217d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3000 r8:85217d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85217d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85217d00 r8:8027ecf4 r7:eac41e60 r6:85223f00 r5:851a3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac61fb0 to 0xeac61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85214540 INFO: task kworker/1:474:4306 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cd398000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:475:4308 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:475 state:D stack:0 pid:4308 tgid:4308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac69d84 r8:00000002 r7:60000113 r6:eac69d8c r5:851a6000 r4:851a6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07ab000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e738c r4:851e7000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e738c r4:85217c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a6000 r8:85217cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85217c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85217c80 r8:8027ecf4 r7:eac41e60 r6:85223f80 r5:851a6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac69fb0 to 0xeac69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85214580 INFO: task kworker/1:475:4308 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cd797000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:476:4310 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:476 state:D stack:0 pid:4310 tgid:4310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac71d84 r8:00000002 r7:60000113 r6:eac71d8c r5:851a5400 r4:851a5400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac71e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07df000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e778c r4:851e7400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e778c r4:85217d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a5400 r8:85217dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85217d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85217d80 r8:8027ecf4 r7:eac41e60 r6:85231000 r5:851a5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac71fb0 to 0xeac71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85214780 INFO: task kworker/1:476:4310 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cd797000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:477:4313 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:477 state:D stack:0 pid:4313 tgid:4313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac7dd84 r8:00000002 r7:60000013 r6:eac7dd8c r5:851a1800 r4:851a1800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e486b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e7f8c r4:851e7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851e7f8c r4:85217e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a1800 r8:85217e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85217e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85217e00 r8:8027ecf4 r7:eac41e60 r6:85231080 r5:851a1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac7dfb0 to 0xeac7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852148c0 INFO: task kworker/1:477:4313 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cdb9f000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:478:4315 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:478 state:D stack:0 pid:4315 tgid:4315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac85d84 r8:00000002 r7:60000113 r6:eac85d8c r5:851a6c00 r4:851a6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac85e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e888b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841d878c r4:841d8400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:841d878c r4:85217e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a6c00 r8:85217eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85217e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85217e80 r8:8027ecf4 r7:eac7de60 r6:85231100 r5:851a6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac85fb0 to 0xeac85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85214b00 INFO: task kworker/1:478:4315 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cdb9f000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:479:4316 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:479 state:D stack:0 pid:4316 tgid:4316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac31d84 r8:00000002 r7:60000113 r6:eac31d8c r5:85126c00 r4:85126c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85126c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac31e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db5a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85126c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88b1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ec78c r4:851ec400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ec78c r4:85217f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85126c00 r8:85217f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85217f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85217f00 r8:8027ecf4 r7:eac85e60 r6:85217f80 r5:85126c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac31fb0 to 0xeac31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85214b00 INFO: task kworker/1:479:4316 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cdee1000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:480:4319 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:480 state:D stack:0 pid:4319 tgid:4319 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab55d84 r8:00000002 r7:60000113 r6:eab55d8c r5:8512ec00 r4:8512ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8512ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab55e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8512ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e889d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ec38c r4:851ec000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ec38c r4:85217900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512ec00 r8:8521792c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85217900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85217900 r8:8027ecf4 r7:eac31e60 r6:85217980 r5:8512ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab55fb0 to 0xeab55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85214d40 INFO: task kworker/1:480:4319 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cdee1000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:481:4322 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:481 state:D stack:0 pid:4322 tgid:4322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac81d84 r8:00000002 r7:60000013 r6:eac81d8c r5:85136000 r4:85136000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85136000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85236000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85136000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ecb8c r4:851ec800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ecb8c r4:85217a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85136000 r8:85217a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85217a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85217a00 r8:8027ecf4 r7:eac31e60 r6:85234000 r5:85136000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac81fb0 to 0xeac81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852360c0 INFO: task kworker/1:481:4322 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: ce2d4000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:482:4323 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:482 state:D stack:0 pid:4323 tgid:4323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac89d84 r8:00000002 r7:60000013 r6:eac89d8c r5:85138000 r4:85138000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85138000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac89e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85236240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85138000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88d7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ecf8c r4:851ecc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ecf8c r4:85234080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85138000 r8:852340ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85234080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234080 r8:8027ecf4 r7:eac81e60 r6:85234100 r5:85138000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac89fb0 to 0xeac89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852360c0 INFO: task kworker/1:482:4323 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: ce2d4000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:483:4326 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:483 state:D stack:0 pid:4326 tgid:4326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac8dd84 r8:00000002 r7:60000013 r6:eac8dd8c r5:85138c00 r4:85138c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85138c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac8de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85236300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85138c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88e9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ed38c r4:851ed000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ed38c r4:85234180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85138c00 r8:852341ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85234180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234180 r8:8027ecf4 r7:eac89e60 r6:85234200 r5:85138c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac8dfb0 to 0xeac8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85236200 INFO: task kworker/1:483:4326 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: ce85d000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:484:4327 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:484 state:D stack:0 pid:4327 tgid:4327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac91d84 r8:00000002 r7:60000113 r6:eac91d8c r5:85139800 r4:85139800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85139800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85236500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85139800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea951000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ed78c r4:851ed400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ed78c r4:85234280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85139800 r8:852342ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85234280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: ce85d000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:485:4330 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:4330 tgid:4330 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac95d84 r8:00000002 r7:60000013 r6:eac95d8c r5:8513a400 r4:8513a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8513a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac95e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85236680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8513a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:851edb8c r4:851ed800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:4331 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:486 state:D stack:0 pid:4331 tgid:4331 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac99d84 r8:00000002 r7:60000013 r6:eac99d8c r5:8513b000 r4:8513b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8513b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85236880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8513b000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea983000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851edf8c r4:851edc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851edf8c r4:85234480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513b000 r8:852344ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85234480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234480 r8:8027ecf4 r7:eac95e60 r6:85234500 r5:8513b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac99fb0 to 0xeac99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:8513bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85236940 r7:ddde2d40 r6:83018200 r5:851ee38c r4:85234580 Exception stack(0xeac9dfb0 to 0xeac9dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:eda49000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:488 state:D stack:0 pid:4335 tgid:4335 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8513c800 r5:8513c800 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca1e08 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8513c800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851eeb8c r4:851ee800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851eeb8c r4:85234680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513c800 r8:852346ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85234680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234680 r8:8027ecf4 r7:eac9de60 r6:85234700 r5:8513c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca1fb0 to 0xeaca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85236980 INFO: task kworker/1:488:4335 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cec9a000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:489:4336 blocked for more than 457 seconds. r5:8513d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca9e08 r9:83018205 r8:8513d400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06c9d20 to 0xe06c9d68) [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e06c9dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:490:4339 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:490 state:D stack:0 pid:4339 tgid:4339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaca5d84 r8:00000002 r7:60000013 r6:eaca5d8c r5:8513e000 r4:8513e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8513e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85224e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8513e000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa47000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ef38c r4:851ef000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaca5fb0 to 0xeaca5ff8) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r4:84ffea80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8513ec00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85236e00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8513ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa23000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851eef8c r4:851eec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851eef8c r4:85234980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513ec00 r8:852349ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85234980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234980 r8:8027ecf4 r7:eaca5e60 r6:85234a00 r5:8513ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb1fb0 to 0xeacb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85236e40 INFO: task kworker/1:491:4341 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cf8a6000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:492:4343 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:847e9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacbde08 r4:00000000 r7:ddde2d40 r6:83018200 r5:851f838c r4:85234a80 INFO: task kworker/1:492:4343 is blocked on a mutex likely owned by task kworker/0:73:3846. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r5:00001000 r4:eda49000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847ea400 r5:847ea400 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524b000 r5:851ef78c r4:851ef400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ef78c r4:85234b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847ea400 r8:85234b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85234b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234b00 r8:8027ecf4 r7:eacbde60 r6:85231200 r5:847ea400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc5fb0 to 0xeacc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8524b0c0 INFO: task kworker/1:493:4345 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: cfd01000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe06c9fb0 to 0xe06c9ff8) INFO: task kworker/1:494:4346 blocked for more than 457 seconds. r5:847e8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:847e8000 r8:85234bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06c9d20 to 0xe06c9d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:495:4348 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:495 state:D stack:0 pid:4348 tgid:4348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eacd1d84 r8:00000002 r7:60000113 r6:eacd1d8c r5:847ebc00 r4:847ebc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847ebc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524b300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa93000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851eff8c r4:851efc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851eff8c r4:85234c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847ebc00 r8:85234c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85234c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234c00 r8:8027ecf4 r7:eacbde60 r6:85231300 r5:847ebc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd1fb0 to 0xeacd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8524b1c0 INFO: task kworker/1:495:4348 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:496:4351 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:496 state:D stack:0 pid:4351 tgid:4351 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eacd9d84 r8:00000002 r7:60000113 r6:eacd9d8c r5:847ec800 r4:847ec800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847ec800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524b980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f938c r4:851f9000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851f938c r4:85234c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847ec800 r8:85234cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85234c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234c80 r8:8027ecf4 r7:eacbde60 r6:85231380 r5:847ec800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd9fb0 to 0xeacd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8524b3c0 INFO: task kworker/1:496:4351 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r5:800f0013 r4:80239bb0 r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:847ed400 r5:847ed400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85234d00 Exception stack(0xeacddfb0 to 0xeacddff8) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:847eec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace5e08 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eab99000 r7:ddde2d40 r6:83018200 r5:851f8b8c r4:85234d80 r4:85234d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234d80 r8:8027ecf4 r7:eacd9e60 r6:85231480 r5:847eec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace5fb0 to 0xeace5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8524b540 INFO: task kworker/1:498:4354 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d072b000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:499:4356 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:499 state:D stack:0 pid:4356 tgid:4356 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaccdd84 r8:00000002 r7:60000113 r6:eaccdd8c r5:85270c00 r4:85270c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85270c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaccde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524b7c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85270c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaceb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f8f8c r4:851f8c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851f8f8c r4:85234e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8524b940 Call trace: 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r4:00000000 r5:00001000 r4:eda49000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85272400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacade08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524bb80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85272400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacfb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f978c r4:851f9400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851f978c r4:85234f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85272400 r8:85234f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85234f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234f00 r8:8027ecf4 r7:eacd9e60 r6:85234f80 r5:85272400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacadfb0 to 0xeacadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8524b8c0 INFO: task kworker/1:500:4359 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d0dd0000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:501:4360 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:501 state:D stack:0 pid:4360 tgid:4360 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85273c00 r5:85273c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:502:4363 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:502 state:D stack:0 pid:4363 tgid:4363 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ead11d84 r8:00000002 r7:60000113 r6:ead11d8c r5:85273000 r4:85273000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85273000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead11e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85273000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead23000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f9f8c r4:851f9c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851f9f8c r4:8525c100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85273000 r8:8525c12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8525c100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525c100 r8:8027ecf4 r7:eace9e60 r6:8525c180 r5:85273000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead11fb0 to 0xead11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8524bc40 INFO: task kworker/1:502:4363 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d124e000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85275400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8456c640 r5:8517278c r4:85172400 r7:dddced40 r6:83018000 r5:8517278c r4:85231500 r10:61c88647 r9:85275400 r8:8523152c r7:82804d40 r6:dddced40 r5:dddced60 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 r5:800f0013 r4:80239bb0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85e2bb8c r4:85e2b800 r4:84ffea80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: r5:847e8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524bd80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead5b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517138c r4:85171000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8517138c r4:85231580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e8c00 r8:852315ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85231580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85231580 r8:8027ecf4 r7:ead21e60 r6:85231600 r5:847e8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf5fb0 to 0xeacf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8523c580 INFO: task kworker/0:116:4367 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d1846000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:ead1dd84 r8:00000002 r7:60000113 r6:ead1dd8c r5:85274800 r5:85274800 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852523c0 r5:851fab8c r4:851fa800 r10:61c88647 r9:85274800 r8:8525c2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xead1dfb0 to 0xead1dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06c9d20 to 0xe06c9d68) 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:504:4372 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:504 state:D stack:0 pid:4372 tgid:4372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ead15d84 r8:00000002 r7:60000013 r6:ead15d8c r5:85276000 r4:85276000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85276000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead15e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85276000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead29000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fa38c r4:851fa000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851fa38c r4:8525c380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85276000 r8:8525c3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8525c380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525c380 r8:8027ecf4 r7:ead1de60 r6:8525c400 r5:85276000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead15fb0 to 0xead15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85252080 INFO: task kworker/1:504:4372 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d1d59000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85276c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:506:4375 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:506 state:D stack:0 pid:4375 tgid:4375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ead31d84 r8:00000002 r7:60000013 r6:ead31d8c r5:85270000 r4:85270000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85270000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead31e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85270000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead47000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851faf8c r4:851fac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851faf8c r4:8525c580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85270000 r8:8525c5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8525c580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525c580 r8:8027ecf4 r7:ead1de60 r6:8525c600 r5:85270000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead31fb0 to 0xead31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85252640 INFO: task kworker/1:506:4375 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d22e4000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:507 state:D stack:0 pid:4377 tgid:4377 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85278000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85278000 r8:8525c6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8525c680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525c680 r8:8027ecf4 r7:ead31e60 r6:8525c700 r5:85278000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead51fb0 to 0xead51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85252640 INFO: task kworker/1:507:4377 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d22e4000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:508:4379 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:508 state:D stack:0 pid:4379 tgid:4379 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ead59d84 r8:00000002 r7:60000113 r6:ead59d8c r5:85279800 r4:85279800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85279800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead59e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252b80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85279800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead61000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fb78c r4:851fb400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851fb78c r4:8525c780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85279800 r8:8525c7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8525c780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525c780 r8:8027ecf4 r7:ead51e60 r6:8525c800 r5:85279800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead59fb0 to 0xead59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85252880 INFO: task kworker/1:508:4379 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d25f6000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r5:85e2bb8c r4:85e2b800 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85278c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8456c540 r5:8517238c r4:85172000 r10:61c88647 r9:85278c00 r8:852316ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:509:4383 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:509 state:D stack:0 pid:4383 tgid:4383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ead79d84 r8:00000002 r7:60000113 r6:ead79d8c r5:8527bc00 r4:8527bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8527bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead79e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8527bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fbb8c r4:851fb800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851fbb8c r4:8525c900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:e06c9dc0 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 Exception stack(0xe06c9fb0 to 0xe06c9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829189c0 r9:ead6dd84 r8:00000002 r7:60000013 r6:ead6dd8c r5:8527c800 r5:8527c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8525ca00 r8:8027ecf4 r7:ead79e60 r6:8525ca80 r5:8527c800 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d2949000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:511:4387 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:511 state:D stack:0 pid:4387 tgid:4387 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ead7dd84 r8:00000002 r7:60000013 r6:ead7dd8c r5:8527b000 r4:8527b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8527b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead7de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525e040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8527b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb75000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fbf8c r4:851fbc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851fbf8c r4:8525cb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527b000 r8:8525cb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:e06c9dc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8527e000 r5:8527e000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525e9c0 r5:84594f8c r4:84594c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84594f8c r4:8525cc00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527e000 r8:8525cc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8525cc00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525cc00 r8:8027ecf4 r7:ead6de60 r6:8525cc80 r5:8527e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac2dfb0 to 0xeac2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8525e500 INFO: task kworker/1:512:4389 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d2e7f000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:513:4390 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:513 state:D stack:0 pid:4390 tgid:4390 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ead85d84 r8:00000002 r7:60000013 r6:ead85d8c r5:8527ec00 r4:8527ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8527ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead85e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525e540 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8527ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8459478c r4:84594400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8459478c r4:8525cd00 r10:61c88647 r9:8527ec00 r8:8525cd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 Exception stack(0xead85fb0 to 0xead85ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85271800 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r5:00001000 r4:e0479000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d313d000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:515:4395 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:515 state:D stack:0 pid:4395 tgid:4395 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ead8dd84 r8:00000002 r7:60000113 r6:ead8dd8c r5:8527a400 r4:8527a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8527a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead8de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525ebc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8527a400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8459538c r4:84595000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8459538c r4:8525cf00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527a400 r8:8525cf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8525cf00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525cf00 r8:8027ecf4 r7:eac2de60 r6:8525cf80 r5:8527a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead8dfb0 to 0xead8dff8) r4:8525e640 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:847ee000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xead3dfb0 to 0xead3dff8) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r5:85e2bb8c r4:85e2b800 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:517:4399 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:517 state:D stack:0 pid:4399 tgid:4399 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ead95d84 r8:00000002 r7:60000013 r6:ead95d8c r5:847eb000 r4:847eb000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847eb000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead95e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525edc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0727000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84595b8c r4:84595800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84595b8c r4:85257080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847eb000 r8:852570ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85257080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85257080 r8:8027ecf4 r7:ead3de60 r6:85231780 r5:847eb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead95fb0 to 0xead95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8525eb00 INFO: task kworker/1:517:4399 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d3783000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:518:4401 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:518 state:D stack:0 pid:4401 tgid:4401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ead99d84 r8:00000002 r7:60000013 r6:ead99d8c r5:84d0b000 r4:84d0b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d0b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85263000 r7:ddde2d40 r6:83018200 r5:8517178c r4:85257100 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r5:800f0013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:519:4403 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:519 state:D stack:0 pid:4403 tgid:4403 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ead9dd84 r8:00000002 r7:60000113 r6:ead9dd8c r5:85128c00 r4:85128c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85128c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead9de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85251040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85128c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaba5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8459638c r4:84596000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8459638c r4:85257180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85128c00 r8:852571ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85257180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85257180 r8:8027ecf4 r7:ead99e60 r6:85231880 r5:85128c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead9dfb0 to 0xead9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85252e00 INFO: task kworker/1:519:4403 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d3dc0000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 r5:85e2bb8c r4:85e2b800 r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:8500f640 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84ca8000 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252f80 r7:ddde2d40 r6:83018200 r5:84595f8c r4:85257200 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:521:4408 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:521 state:D stack:0 pid:4408 tgid:4408 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eada5d84 r8:00000002 r7:60000113 r6:eada5d8c r5:84ca8c00 r4:84ca8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ca8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852511c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ca8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabd7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8459678c r4:84596400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8459678c r4:85257280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ca8c00 r8:852572ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85257280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85257280 r8:8027ecf4 r7:ead9de60 r6:85231980 r5:84ca8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada5fb0 to 0xeada5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85251240 INFO: task kworker/1:521:4408 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d42b9000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:522:4409 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:522 state:D stack:0 pid:4409 tgid:4409 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eada9d84 r8:00000002 r7:60000113 r6:eada9d8c r5:84ca9800 r4:84ca9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ca9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85251340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ca9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84596b8c r4:84596800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84596b8c r4:85257300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ca9800 r8:8525732c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:e06c9dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:84caa400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeadadfb0 to 0xeadadff8) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:8500f640 Call trace: r5:84cac800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cac800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac0d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8459738c r4:84597000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8459738c r4:85257400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cac800 r8:8525742c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85257400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85257400 r8:8027ecf4 r7:eadade60 r6:85231b00 r5:84cac800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb9fb0 to 0xeadb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85251440 INFO: task kworker/1:524:4414 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d4496000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 INFO: task kworker/1:525:4415 blocked for more than 458 seconds. r5:84cad400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeadbdfb0 to 0xeadbdff8) Workqueue: events bpf_prog_free_deferred 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r4:84ffea80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84cab000 r5:84cab000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc1e08 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeadc1fb0 to 0xeadc1ff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d4809000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:527:4419 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:527 state:D stack:0 pid:4419 tgid:4419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eadc5d84 r8:00000002 r7:60000013 r6:eadc5d8c r5:84cae000 r4:84cae000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cae000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85251940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cae000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead71000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84597f8c r4:84597c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84597f8c r4:85257580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cae000 r8:852575ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85257580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85257580 r8:8027ecf4 r7:eadbde60 r6:85231c80 r5:84cae000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc5fb0 to 0xeadc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852517c0 INFO: task kworker/1:527:4419 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 Exception stack(0xe06c9d20 to 0xe06c9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84ffea80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84cabc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85251ac0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeadd9fb0 to 0xeadd9ff8) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:529:4423 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:529 state:D stack:0 pid:4423 tgid:4423 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eade1d84 r8:00000002 r7:60000013 r6:eade1d8c r5:851b8c00 r4:851b8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851b8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85251d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84578b8c r4:84578800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84578b8c r4:85257680 r10:61c88647 r9:851b8c00 r8:852576ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 INFO: task kworker/1:530:4424 blocked for more than 458 seconds. r4:851b9800 r5:851b9800 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r5:00001000 r4:eadd5000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:e06c9dc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:531:4426 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:531 state:D stack:0 pid:4426 tgid:4426 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eadf1d84 r8:00000002 r7:60000013 r6:eadf1d8c r5:851b8000 r4:851b8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851b8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525ed00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae07000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8457938c r4:84579000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8457938c r4:85257780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b8000 r8:852577ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85257780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85257780 r8:8027ecf4 r7:eade1e60 r6:85231e80 r5:851b8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf1fb0 to 0xeadf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85251b80 INFO: task kworker/1:531:4426 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d5525000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 INFO: task kworker/1:532:4428 blocked for more than 458 seconds. r5:85281800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85251e40 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d20: d55dc000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:533:4431 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:533 state:D stack:0 pid:4431 tgid:4431 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eadfdd84 r8:00000002 r7:60000113 r6:eadfdd8c r5:85282400 r4:85282400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85282400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526c040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85282400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae1b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84579b8c r4:84579800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84579b8c r4:85257900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85282400 r8:8525792c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85257900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85257900 r8:8027ecf4 r7:eadf1e60 r6:85257980 r5:85282400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadfdfb0 to 0xeadfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85251fc0 INFO: task kworker/1:533:4431 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d5869000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r4:82ac11e4 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85e2bb8c r4:85e2b800 r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 INFO: task kworker/1:534:4433 blocked for more than 458 seconds. r4:85283000 r5:85283000 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252e00 r7:ddde2d40 r6:83018200 r5:8457978c r4:85257a00 Exception stack(0xeadb1fb0 to 0xeadb1ff8) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:8500f640 Workqueue: events bpf_prog_free_deferred r5:85283c00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526c340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85283c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae2f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8457a38c r4:8457a000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8457a38c r4:85257b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85283c00 r8:85257b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85257b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85257b00 r8:8027ecf4 r7:eadfde60 r6:85257b80 r5:85283c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae11fb0 to 0xeae11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8526c000 INFO: task kworker/1:535:4435 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d5c17000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85284800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae19e08 r9:83018205 r8:85284800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 r4:85257c00 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eae25d84 r8:00000002 r7:60000113 r6:eae25d8c r5:85285400 r5:85285400 r4:829189bc r4:00000000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85285400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae35000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8457a78c r4:8457a400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8457a78c r4:85257d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85285400 r8:85257d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85257d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85257d00 r8:8027ecf4 r7:eae11e60 r6:85257d80 r5:85285400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae25fb0 to 0xeae25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8526c300 INFO: task kworker/1:537:4440 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d5f45000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:8500f640 Workqueue: events bpf_prog_free_deferred r5:85286000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eae3f000 r10:61c88647 r9:85286000 r8:85257e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 9d20: d642c000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:85280000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae2de08 r9:83018205 r8:85280000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 r5:00001000 r4:eae55000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8457b38c r4:8457b000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8457b38c r4:85257f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85280000 r8:85257f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85257f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85257f00 r8:8027ecf4 r7:eae39e60 r6:85257f80 r5:85280000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae2dfb0 to 0xeae2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8526c740 INFO: task kworker/1:539:4443 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d642c000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:540:4444 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:540 state:D stack:0 pid:4444 tgid:4444 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85280c00 r5:85280c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 INFO: task kworker/1:541:4446 blocked for more than 458 seconds. r5:85286c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeae59fb0 to 0xeae59ff8) r4:8526c780 INFO: task kworker/1:541:4446 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d67b6000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:542:4449 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:542 state:D stack:0 pid:4449 tgid:4449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eae69d84 r8:00000002 r7:60000013 r6:eae69d8c r5:85288000 r5:85288000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526ccc0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 9d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829189c0 r9:eae71d84 r8:00000002 r7:60000113 r6:eae71d8c r5:85288c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae71e08 r9:83018205 r8:85288c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 r10:00000000 r9:845aa300 r8:8027ecf4 r7:eae59e60 r6:845aa380 r5:85288c00 Exception stack(0xeae71fb0 to 0xeae71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8526cc80 INFO: task kworker/1:543:4451 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d6aa2000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:544:4454 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:544 state:D stack:0 pid:4454 tgid:4454 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eae81d84 r8:00000002 r7:60000013 r6:eae81d8c r5:85289800 r4:85289800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85289800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae81e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845911c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85289800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae79000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8455838c r4:84558000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8455838c r4:845aa400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85289800 r8:845aa42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845aa400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845aa400 r8:8027ecf4 r7:eae71e60 r6:845aa480 r5:85289800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae81fb0 to 0xeae81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84591240 INFO: task kworker/1:544:4454 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d6d80000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:545:4455 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:545 state:D stack:0 pid:4455 tgid:4455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:8528a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff r4:e06c9dc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:8500f640 r5:8528bc00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae8de08 r7:ddde2d40 r6:83018200 r5:8455938c r4:845aa600 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae8dfb0 to 0xeae8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84591400 INFO: task kworker/1:546:4457 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d706e000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe06c9fb0 to 0xe06c9ff8) Workqueue: events bpf_prog_free_deferred [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:84558b8c r4:84558800 r10:61c88647 r9:8528d400 r8:845aa72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeae99fb0 to 0xeae99ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:548:4461 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:548 state:D stack:0 pid:4461 tgid:4461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaea5d84 r8:00000002 r7:60000013 r6:eaea5d8c r5:8528ec00 r4:8528ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8528ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84591880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:84558f8c r4:845aa800 r4:84591840 Exception stack(0xe06c9d20 to 0xe06c9d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:549:4463 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:549 state:D stack:0 pid:4463 tgid:4463 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r5:00001000 r4:eda49000 r4:84ffea80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eaeb5000 r7:ddde2d40 r6:83018200 r5:84559b8c r4:845aaa00 Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06c9dc0 r5:00001000 r4:eda49000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:551:4467 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:551 state:D stack:0 pid:4467 tgid:4467 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaec5d84 r8:00000002 r7:60000113 r6:eaec5d8c r5:85290000 r4:85290000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85290000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458b040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85290000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaecd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84559f8c r4:84559c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84559f8c r4:845aab00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85290000 r8:845aab2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845aab00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845aab00 r8:8027ecf4 r7:eaeb9e60 r6:845aab80 r5:85290000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec5fb0 to 0xeaec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84591f00 INFO: task kworker/1:551:4467 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 9d60: 800f0013 ffffffff [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:552:4470 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:552 state:D stack:0 pid:4470 tgid:4470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaed1d84 r8:00000002 r7:60000113 r6:eaed1d8c r5:85291800 r4:85291800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458b1c0 r10:61c88647 r9:85291800 r8:845aac2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85e2bb8c r4:85e2b800 Exception stack(0xe06c9fb0 to 0xe06c9ff8) Not tainted 6.15.0-syzkaller #0 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8455ab8c r4:8455a800 r4:00000001 r4:8458b180 INFO: task kworker/1:553:4472 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d7e79000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:554:4474 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:554 state:D stack:0 pid:4474 tgid:4474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaee1d84 r8:00000002 r7:60000013 r6:eaee1d8c r5:85293000 r4:85293000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85293000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458b340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85293000 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaedd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8455a78c r4:8455a400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8455a78c r4:845aae00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85293000 r8:845aae2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845aae00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845aae00 r8:8027ecf4 r7:eae95e60 r6:845aae80 r5:85293000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee1fb0 to 0xeaee1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8458b280 INFO: task kworker/1:554:4474 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d7e79000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r5:00001000 r4:eda49000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac3de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458b740 r5:00001000 r4:dfa49000 r7:ddde2d40 r6:83018200 r5:8455af8c r4:845aaf00 r10:00000000 r9:845aaf00 r8:8027ecf4 r7:eae95e60 r6:845aaf80 r5:85294800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d7e79000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:556:4478 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:556 state:D stack:0 pid:4478 tgid:4478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac6dd84 r8:00000002 r7:60000013 r6:eac6dd8c r5:85293c00 r4:85293c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85293c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac6de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84591f00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85293c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88c9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8455bb8c r4:8455b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8455bb8c r4:84555000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85293c00 r8:8455502c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84555000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84555000 r8:8027ecf4 r7:eac3de60 r6:84555080 r5:85293c00 Exception stack(0xeac6dfb0 to 0xeac6dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:557:4479 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:557 state:D stack:0 pid:4479 tgid:4479 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaee9d84 r8:00000002 r7:60000113 r6:eaee9d8c r5:85296000 r4:85296000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85296000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458b980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85296000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd3b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8455b38c r4:8455b000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8455b38c r4:84555100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85296000 r8:8455512c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84555100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84555100 r8:8027ecf4 r7:eac6de60 r6:84555180 r5:85296000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee9fb0 to 0xeaee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8458b280 INFO: task kworker/1:557:4479 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d82b0000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eda49000 r5:85e2bb8c r4:85e2b800 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:558:4484 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:558 state:D stack:0 pid:4484 tgid:4484 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaef1d84 r8:00000002 r7:60000113 r6:eaef1d8c r5:85296c00 r4:85296c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85296c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458ba80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85296c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88af000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8455b78c r4:8455b400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8455b78c r4:84555200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85296c00 r8:8455522c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84555200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84555200 r8:8027ecf4 r7:eac6de60 r6:84555280 r5:85296c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef1fb0 to 0xeaef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8458bd40 INFO: task kworker/1:558:4484 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d8574000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84ffea80 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:118:4487 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred r4:851bc800 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac75e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8456c700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07e1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85172b8c r4:85172800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85172b8c r4:85231f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bc800 r8:85231f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85231f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85231f00 r8:8027ecf4 r7:ead21e60 r6:85231f80 r5:851bc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac75fb0 to 0xeac75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8456ca80 INFO: task kworker/0:118:4487 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d8574000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:119:4489 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:119 state:D stack:0 pid:4489 tgid:4489 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eacb5d84 r8:00000002 r7:60000113 r6:eacb5d8c r5:851bd400 r4:851bd400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851bd400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8456c900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8893000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517338c r4:85173000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8517338c r4:845a3000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bd400 r8:845a302c r7:82804d40 r6:dddced40 r5:dddced60 r4:845a3000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845a3000 r8:8027ecf4 r7:eac75e60 r6:845a3080 r5:851bd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb5fb0 to 0xeacb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8456ca80 INFO: task kworker/0:119:4489 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d8c0d000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:120:4490 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:120 state:D stack:0 pid:4490 tgid:4490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf01d84 r8:00000002 r7:60000113 r6:eaf01d8c r5:851be000 r4:851be000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851be000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf01e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8456c880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851be000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e484d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85172f8c r4:85172c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85172f8c r4:845a3100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851be000 r8:845a312c r7:82804d40 r6:dddced40 r5:dddced60 r4:845a3100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845a3100 r8:8027ecf4 r7:eacb5e60 r6:845a3180 r5:851be000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf01fb0 to 0xeaf01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8456ca80 INFO: task kworker/0:120:4490 is blocked on a mutex likely owned by task kworker/0:73:3846. Workqueue: events bpf_prog_free_deferred r4:00000000 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:121:4491 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:121 state:D stack:0 pid:4491 tgid:4491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaef9d84 r8:00000002 r7:60000113 r6:eaef9d8c r5:851bec00 r4:851bec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851bec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8459c040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb00b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85173f8c r4:85173c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85173f8c r4:845a3200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bec00 r8:845a322c r7:82804d40 r6:dddced40 r5:dddced60 r4:845a3200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845a3200 r8:8027ecf4 r7:eacb5e60 r6:845a3280 r5:851bec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef9fb0 to 0xeaef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8456ca80 INFO: task kworker/0:121:4491 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d8d6a000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:559:4494 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:559 state:D stack:0 pid:4494 tgid:4494 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaefdd84 r8:00000002 r7:60000113 r6:eaefdd8c r5:85290c00 r4:85290c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85290c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaefde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85263b80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85290c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88e1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8455bf8c r4:8455bc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8455bf8c r4:84555300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85290c00 r8:8455532c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84555300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84555300 r8:8027ecf4 r7:eac6de60 r6:84555380 r5:85290c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaefdfb0 to 0xeaefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85263a40 INFO: task kworker/1:559:4494 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d8d6a000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:560:4496 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:560 state:D stack:0 pid:4496 tgid:4496 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf09d84 r8:00000002 r7:60000113 r6:eaf09d8c r5:85295400 r4:85295400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85295400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf09e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526d0c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85295400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea981000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8453c78c r4:8453c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8453c78c r4:84555400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85295400 r8:8455542c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84555400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84555400 r8:8027ecf4 r7:eaefde60 r6:84555480 r5:85295400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf09fb0 to 0xeaf09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8458bc00 INFO: task kworker/1:560:4496 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d9352000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:561:4497 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:561 state:D stack:0 pid:4497 tgid:4497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf11d84 r8:00000002 r7:60000013 r6:eaf11d8c r5:851bb000 r4:851bb000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851bb000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf11e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526d000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea95b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8453c38c r4:8453c000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8453c38c r4:84555500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bb000 r8:8455552c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84555500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84555500 r8:8027ecf4 r7:eaf09e60 r6:845a3300 r5:851bb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf11fb0 to 0xeaf11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8458bc00 INFO: task kworker/1:561:4497 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d9352000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:562:4500 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:562 state:D stack:0 pid:4500 tgid:4500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf45d84 r8:00000002 r7:60000113 r6:eaf45d8c r5:84caec00 r4:84caec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84caec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf45e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526d2c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84caec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9d9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8453cb8c r4:8453c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8453cb8c r4:84555580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84caec00 r8:845555ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84555580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84555580 r8:8027ecf4 r7:eaf09e60 r6:845a3380 r5:84caec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf45fb0 to 0xeaf45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8526d100 INFO: task kworker/1:562:4500 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d9557000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:122:4501 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:122 state:D stack:0 pid:4501 tgid:4501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf49d84 r8:00000002 r7:60000113 r6:eaf49d8c r5:84ed0000 r4:84ed0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ed0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf49e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84546180 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ed0000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf5b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85173b8c r4:85173800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85173b8c r4:845a3400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ed0000 r8:845a342c r7:82804d40 r6:dddced40 r5:dddced60 r4:845a3400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845a3400 r8:8027ecf4 r7:eaef9e60 r6:845a3480 r5:84ed0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf49fb0 to 0xeaf49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8456c040 INFO: task kworker/0:122:4501 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d9557000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:563:4502 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:563 state:D stack:0 pid:4502 tgid:4502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf51d84 r8:00000002 r7:60000113 r6:eaf51d8c r5:84ed0c00 r4:84ed0c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ed0c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf51e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526d540 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ed0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa2d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8453d38c r4:8453d000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8453d38c r4:84555600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ed0c00 r8:8455562c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84555600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84555600 r8:8027ecf4 r7:eaf45e60 r6:845a3500 r5:84ed0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf51fb0 to 0xeaf51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8526d100 INFO: task kworker/1:563:4502 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d9909000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:564:4504 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:564 state:D stack:0 pid:4504 tgid:4504 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf59d84 r8:00000002 r7:60000113 r6:eaf59d8c r5:84ed2400 r4:84ed2400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ed2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf59e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526d3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ed2400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa03000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8453cf8c r4:8453cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8453cf8c r4:84555700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ed2400 r8:8455572c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84555700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84555700 r8:8027ecf4 r7:eaf51e60 r6:845a3580 r5:84ed2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf59fb0 to 0xeaf59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8526d4c0 INFO: task kworker/1:564:4504 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r5:00001000 r4:eda49000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:e06c9dc0 r4:00000000 r5:85e2bb8c r4:85e2b800 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:566:4509 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:566 state:D stack:0 pid:4509 tgid:4509 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf71d84 r8:00000002 r7:60000013 r6:eaf71d8c r5:84ed3c00 r4:84ed3c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ed3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf71e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526d6c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ed3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa65000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8453d78c r4:8453d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8453d78c r4:84555780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ed3c00 r8:845557ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84555780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84555780 r8:8027ecf4 r7:eaf6de60 r6:845a3680 r5:84ed3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf71fb0 to 0xeaf71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8526d740 INFO: task kworker/1:566:4509 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: d9c15000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:84ffea80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526d840 r7:ddde2d40 r6:83018200 r5:8453db8c r4:84555800 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06c9d20 to 0xe06c9d68) r4:e06c9dc0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:568:4513 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:568 state:D stack:0 pid:4513 tgid:4513 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf89d84 r8:00000002 r7:60000013 r6:eaf89d8c r5:84ed6000 r4:84ed6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ed6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526ddc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ed6000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac47000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8453eb8c r4:8453e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8453eb8c r4:84555880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ed6000 r8:845558ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84555880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84555880 r8:8027ecf4 r7:eaf6de60 r6:845a3780 r5:84ed6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf89fb0 to 0xeaf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8526d8c0 INFO: task kworker/1:568:4513 is blocked on a mutex likely owned by task kworker/0:73:3846. r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:569:4514 blocked for more than 459 seconds. r5:84ed6c00 r4:829189bc r4:00000000 r9:83018205 r8:84ed6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8526d8c0 Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:570:4516 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:570 state:D stack:0 pid:4516 tgid:4516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf69d84 r8:00000002 r7:60000113 r6:eaf69d8c r5:8528b000 r4:8528b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8528b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf69e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526dbc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8528b000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab95000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8453e78c r4:8453e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8453e78c r4:84555980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8528b000 r8:845559ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84555980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84555980 r8:8027ecf4 r7:eaf89e60 r6:84555a00 r5:8528b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf69fb0 to 0xeaf69ff8) Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85e2bb8c r4:85e2b800 r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:8500f640 task:kworker/1:571 state:D stack:0 pid:4518 tgid:4518 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa5e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:572:4522 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:572 state:D stack:0 pid:4522 tgid:4522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf91d84 r8:00000002 r7:60000113 r6:eaf91d8c r5:8528c800 r4:8528c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8528c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf91e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8456ce40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8528c800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 r5:8453f38c r4:8453f000 Exception stack(0xeaf91fb0 to 0xeaf91ff8) Exception stack(0xe06c9d20 to 0xe06c9d68) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:61c88647 r9:85298000 r8:84555c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:574:4525 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:574 state:D stack:0 pid:4525 tgid:4525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eafbdd84 r8:00000002 r7:60000013 r6:eafbdd8c r5:85298c00 r4:85298c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85298c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafbde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845881c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85298c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8453ff8c r4:8453fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 800f0013 ffffffff r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8500f640 r10:829189c0 r9:eafb5d84 r8:00000002 r7:60000013 r6:eafb5d8c r5:85299800 r5:8453fb8c r4:8453f800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:800f0013 r4:80239bb0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r4:00000001 INFO: task kworker/1:576:4529 blocked for more than 459 seconds. [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8529a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845885c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8529a400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a878c r4:852a8400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a878c r4:84555f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8529a400 r8:84555f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84555f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84555f00 r8:8027ecf4 r7:eafbde60 r6:84555f80 r5:8529a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc1fb0 to 0xeafc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84588200 INFO: task kworker/1:576:4529 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: dad53000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:577:4530 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:577 state:D stack:0 pid:4530 tgid:4530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eafb9d84 r8:00000002 r7:60000113 r6:eafb9d8c r5:8529b000 r4:8529b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8529b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:852a838c r4:852a8000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: dad53000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/1:578 state:D stack:0 pid:4533 tgid:4533 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852a9f8c r4:852a9c00 Exception stack(0xeafc5fb0 to 0xeafc5ff8) r4:00000000 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a8b8c r4:852a8800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:800f0013 r4:80239bb0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r4:84ffea80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafcde08 r5:852a8f8c r4:852a8c00 Exception stack(0xeafcdfb0 to 0xeafcdff8) INFO: task kworker/1:580:4537 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: db674000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:61c88647 r9:8529ec00 r8:8458242c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000000 r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:829189c0 r9:eafd9d84 r8:00000002 r7:60000113 r6:eafd9d8c r5:852a0c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84588c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead37000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a978c r4:852a9400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a978c r4:84582500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a0c00 r8:8458252c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84582500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84582500 r8:8027ecf4 r7:eafc5e60 r6:84582580 r5:852a0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd9fb0 to 0xeafd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84588bc0 INFO: task kworker/1:582:4541 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: db9e1000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:583 state:D stack:0 pid:4542 tgid:4542 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:852a1800 r8:8458262c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84582600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84582600 r8:8027ecf4 r7:eafc5e60 r6:84582680 r5:852a1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafddfb0 to 0xeafddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84588bc0 INFO: task kworker/1:583:4542 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: db9e1000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:852a2400 r4:829189bc [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:852a9b8c r4:852a9800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84588f40 Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff r4:e06c9dc0 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 INFO: task kworker/1:585:4547 blocked for more than 459 seconds. r5:852a3000 r4:829189bc [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf15000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852aa38c r4:852aa000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852aa38c r4:84582800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a3000 r8:8458282c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84582800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84582800 r8:8027ecf4 r7:eafc5e60 r6:84582880 r5:852a3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe5fb0 to 0xeafe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8526e280 INFO: task kworker/1:585:4547 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: dbf14000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:852a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r10:61c88647 r9:852a3c00 r8:8458292c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:8500f640 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526ed00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb011000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ab78c r4:852ab400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852ab78c r4:84582a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a5400 r8:84582a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84582a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84582a00 r8:8027ecf4 r7:eafe9e60 r6:84582a80 r5:852a5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafedfb0 to 0xeafedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8526e2c0 INFO: task kworker/1:587:4550 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: dc3da000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:588:4553 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:588 state:D stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaff5d84 r8:00000002 r7:60000013 r6:eaff5d8c r5:852a4800 r4:852a4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526e640 r7:ddde2d40 r6:83018200 r5:852aab8c r4:84582b00 Exception stack(0xeaff5fb0 to 0xeaff5ff8) Workqueue: events bpf_prog_free_deferred 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:589:4556 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:589 state:D stack:0 pid:4556 tgid:4556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb001d84 r8:00000002 r7:60000013 r6:eb001d8c r5:852a0000 r4:852a0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526e800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852aaf8c r4:852aac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852aaf8c r4:84582c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a0000 r8:84582c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 r4:8500f640 r4:852a6c00 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:852a6c00 r8:84582d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:123:4560 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:123 state:D stack:0 pid:4560 tgid:4560 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eafe1d84 r8:00000002 r7:60000113 r6:eafe1d8c r5:851bbc00 r4:851bbc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851bbc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca4840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r7:dddced40 r6:83018000 r5:852c838c r4:845a3900 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) INFO: task kworker/0:124:4561 blocked for more than 459 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08 r10:61c88647 r9:851ba400 r8:845a3a2c r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r5:00001000 r4:eda49000 r4:84ffea80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:61c88647 r9:84ed3000 r8:84582e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeb01dfb0 to 0xeb01dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8526ecc0 INFO: task kworker/1:591:4563 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: dce93000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:592:4565 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:592 state:D stack:0 pid:4565 tgid:4565 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb029d84 r8:00000002 r7:60000013 r6:eb029d8c r5:85340000 r4:85340000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85340000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb029e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84572100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85340000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb039000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:82ac11e4 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:593:4566 blocked for more than 459 seconds. [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:594:4570 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:594 state:D stack:0 pid:4570 tgid:4570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb04dd84 r8:00000002 r7:60000113 r6:eb04dd8c r5:85303000 r4:85303000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85303000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84572280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85303000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb043000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b878c r4:852b8400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852b878c r4:84561000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85303000 r8:8456102c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84561000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84561000 r8:8027ecf4 r7:eb029e60 r6:84561080 r5:85303000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb04dfb0 to 0xeb04dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845720c0 INFO: task kworker/1:594:4570 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: dd632000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85e2bb8c r4:85e2b800 r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:8500f640 Workqueue: events bpf_prog_free_deferred r5:85302400 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:852b8f8c r4:852b8c00 r10:61c88647 r9:85302400 r8:8456112c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84561100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84561100 r8:8027ecf4 r7:eb04de60 r6:84561180 r5:85302400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb051fb0 to 0xeb051ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845721c0 INFO: task kworker/1:595:4572 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: dd632000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:85300000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b8b8c r4:852b8800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852b8b8c r4:84561200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85300000 r8:8456122c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84561200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84561200 r8:8027ecf4 r7:eb051e60 r6:84561280 r5:85300000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb059fb0 to 0xeb059ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84572680 INFO: task kworker/1:596:4573 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: dd89b000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84572cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85305400 r7:00000000 r6:83018200 r5:00001000 r4:7f0eb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb073000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b978c r4:852b9400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852b978c r4:84561400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85305400 r8:8456142c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84561400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84561400 r8:8027ecf4 r7:eb065e60 r6:84561480 r5:85305400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb06dfb0 to 0xeb06dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84572680 INFO: task kworker/1:598:4578 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: ddb2e000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84ffea80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:599 state:D stack:0 pid:4579 tgid:4579 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb071e08 r5:00001000 r4:eb079000 r5:852b9b8c r4:852b9800 r10:00000000 r9:84561500 r8:8027ecf4 r7:eb06de60 r6:84561580 r5:85306000 r4:84572680 Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff r4:e06c9dc0 r4:00000000 r5:00001000 r4:eda49000 r5:85e2bb8c r4:85e2b800 r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:8500f640 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:eacfd000 r7:dddced40 r6:83018000 r5:8538ef8c r4:845a3c00 r4:8459c380 r4:00000000 9d60: 800f0013 ffffffff r4:e06c9dc0 r4:00000000 r5:00001000 r4:eda49000 r5:85e2bb8c r4:85e2b800 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:600:4583 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:600 state:D stack:0 pid:4583 tgid:4583 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb085d84 r8:00000002 r7:60000113 r6:eb085d8c r5:8529e000 r4:8529e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8529e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb085e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84574700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8529e000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bab8c r4:852ba800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852bab8c r4:84561680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8529e000 r8:845616ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84561680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84561680 r8:8027ecf4 r7:eb071e60 r6:84561700 r5:8529e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb085fb0 to 0xeb085ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84572d80 INFO: task kworker/1:600:4583 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: de2f8000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:601:4584 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85301800 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:852b9f8c r4:852b9c00 r10:00000000 r9:84561780 r8:8027ecf4 r7:eb085e60 r6:84561800 r5:85301800 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:602:4587 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:602 state:D stack:0 pid:4587 tgid:4587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eadc9d84 r8:00000002 r7:60000013 r6:eadc9d8c r5:85308000 r4:85308000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85308000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845742c0 r4:00000000 r9:83018205 r8:85308000 r7:00000000 r6:83018200 r5:00001000 r4:7f0f1000 r10:61c88647 r9:85308000 r8:845618ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06c9d20 to 0xe06c9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84ffea80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaddde08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeadddfb0 to 0xeadddff8) task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06c9dc0 r4:00000000 r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8530a400 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:852baf8c r4:84561a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530a400 r8:84561aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84561a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84561a80 r8:8027ecf4 r7:eb085e60 r6:84561b00 r5:8530a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb03dfb0 to 0xeb03dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84574240 INFO: task kworker/1:604:4590 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: dec6f000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:605:4594 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:605 state:D stack:0 pid:4594 tgid:4594 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb031d84 r8:00000002 r7:60000013 r6:eb031d8c r5:8530b000 r4:8530b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8530b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84574c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8530b000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e074f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bbb8c r4:852bb800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852bbb8c r4:84561b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530b000 r8:84561bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84561b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84561b80 r8:8027ecf4 r7:eb03de60 r6:84561c00 r5:8530b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb031fb0 to 0xeb031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84574800 INFO: task kworker/1:605:4594 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: deecf000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:606 state:D stack:0 pid:4595 tgid:4595 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:852bb38c r4:852bb000 r10:00000000 r9:84561c80 r8:8027ecf4 r7:eb031e60 r6:84561d00 r5:8530bc00 task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:8530c800 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84574ac0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bb78c r4:852bb400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852bb78c r4:84561d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530c800 r8:84561dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84561d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84561d80 r8:8027ecf4 r7:eb031e60 r6:84561e00 r5:8530c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb099fb0 to 0xeb099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84574a00 INFO: task kworker/1:607:4597 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06c9d20 to 0xe06c9d68) 9d20: df2ab000 dfd53000 00000001 80239b98 7f281000 00000001 82ac11c4 82ac05a0 9d40: 7f281000 dfd53000 8280c9b4 e06c9d9c e06c9da0 e06c9d70 80230ad4 80239bb0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:e06c9dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85933500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84ffea80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84574b80 r10:8280c9b4 r9:85078000 r8:80200be4 r7:e06c9d54 r6:ffffffff r5:85078000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8530ec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08 r5:852bbf8c r4:852bbc00 r10:00000000 r9:84561f80 r8:8027ecf4 r7:eade9e60 r6:8455f000 r5:8530ec00 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06c9dc0 r5:e06c9e08 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e2bb8c r4:85e2b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e2bb8c r4:84ffea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84ffeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffea80 r8:8027ecf4 r7:e06c5e60 r6:85004d80 r5:85078000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500f640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:610:4604 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:610 state:D stack:0 pid:4604 tgid:4604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb09dd84 r8:00000002 r7:60000113 r6:eb09dd8c r5:8530d400 r4:8530d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8530d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb09de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8459d040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8530d400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabeb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537438c r4:85374000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8537438c r4:8455f080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530d400 r8:8455f0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8455f080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8455f080 r8:8027ecf4 r7:eade9e60 r6:8455f100 r5:8530d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb09dfb0 to 0xeb09dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8459d080 INFO: task kworker/1:610:4604 is blocked on a mutex likely owned by task kworker/0:73:3846. task:kworker/0:73 state:R running task stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000001 r9:80295adc r8:e06c9cf8 r7:e06c9d1c r6:85078000 r5:8022be54 r4:80289788 [] (0xb795f4c1) from [<00000002>] (0x2) Backtrace aborted due to bad frame pointer <81c01ab4> Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:611:4606 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:611 state:D stack:0 pid:4606 tgid:4606 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb0a5d84 r8:00000002 r7:60000113 r6:eb0a5d8c r5:85309800 r4:85309800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85309800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8459d340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85309800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac17000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85374b8c r4:85374800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 r4:e06cddc0 r5:84ff7f8c r4:84ff7c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829189c0 r9:eb0a9d84 r8:00000002 r7:60000113 r6:eb0a9d8c r5:85306c00 r5:85306c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:613 state:D stack:0 pid:4610 tgid:4610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb0b1d84 r8:00000002 r7:60000013 r6:eb0b1d8c r5:85310000 r4:85310000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85310000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b1e08 r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85310c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85375f8c r4:85375c00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8459d400 INFO: task kworker/1:614:4611 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85004e00 Not tainted 6.15.0-syzkaller #0 r5:85311800 r4:829189bc r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Workqueue: events bpf_prog_free_deferred r4:e06cddc0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:616:4616 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:616 state:D stack:0 pid:4616 tgid:4616 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb0add84 r8:00000002 r7:60000113 r6:eb0add8c r5:85312400 r4:85312400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85312400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ade08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:e06cddc0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 INFO: task kworker/1:617:4618 blocked for more than 460 seconds. r5:85313000 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:618 state:D stack:0 pid:4620 tgid:4620 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 r4:8459dd00 Call trace: dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:619:4621 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:619 state:D stack:0 pid:4621 tgid:4621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb0bdd84 r8:00000002 r7:60000113 r6:eb0bdd8c r5:85315400 r4:85315400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85315400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0bde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e03000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85315400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae29000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85376b8c r4:85376800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85376b8c r4:8455f980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85315400 r8:8455f9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8455f980 dfa0: 00000000 00000000 00000000 00000000 dd60: 900f0113 ffffffff r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85316000 r4:829189bc [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:85316000 r8:8455faac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Call trace: r4:82ac11e4 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb0d1d84 r8:00000002 r7:60000013 r6:eb0d1d8c r5:85316c00 r4:85316c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85316c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e03580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85316c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae5b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537778c r4:85377400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8537778c r4:8455fb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85316c00 r8:8455fbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8455fb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8455fb80 r8:8027ecf4 r7:eb0c9e60 r6:8455fc00 r5:85316c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d1fb0 to 0xeb0d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r5:00001000 r4:dfd83000 Exception stack(0xe06cdfb0 to 0xe06cdff8) r4:85314800 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd60: 900f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:623:4631 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:623 state:D stack:0 pid:4631 tgid:4631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb0d5d84 r8:00000002 r7:60000013 r6:eb0d5d8c r5:85318c00 r5:85318c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) INFO: task kworker/1:623:4631 is blocked on a mutex likely owned by task kworker/1:290:3848. r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85319800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0dde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e038c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85319800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae75000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85377f8c r4:85377c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85377f8c r4:8455fe80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85319800 r8:8455feac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8455fe80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:8531b000 r4:829189bc [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e1fb0 to 0xeb0e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e03880 INFO: task kworker/1:625:4634 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:84ff7f8c r4:84ff7c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8531bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:8538438c r4:85384000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e06cddc0 r5:84ff7f8c r4:84ff7c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e03d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85344800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85384b8c r4:85384800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85384b8c r4:8501d180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85344800 r8:8501d1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501d180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8501d180 r8:8027ecf4 r7:eb0e1e60 r6:845a3c80 r5:85344800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e9fb0 to 0xeb0e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e03c80 INFO: task kworker/1:627:4638 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:628:4640 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:628 state:D stack:0 pid:4640 tgid:4640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb0d9d84 r8:00000002 r7:60000113 r6:eb0d9d8c r5:85318000 r4:85318000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85318000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85384f8c r4:85384c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85384f8c r4:8501d200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85318000 r8:8501d22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501d200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8501d200 r8:8027ecf4 r7:eb0e9e60 r6:8501d280 r5:85318000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d9fb0 to 0xeb0d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e03dc0 INFO: task kworker/1:628:4640 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:629 state:D stack:0 pid:4643 tgid:4643 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8531c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8531c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538538c r4:85385000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8538538c r4:8501d300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531c800 r8:8501d32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:629:4643 is blocked on a mutex likely owned by task kworker/1:290:3848. [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:630:4644 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:630 state:D stack:0 pid:4644 tgid:4644 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8531d400 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8531d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538578c r4:85385400 r4:00000001 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 INFO: task kworker/1:631:4646 blocked for more than 460 seconds. r5:8531e000 r4:829189bc r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8531e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaedb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85385b8c r4:85385800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85385b8c r4:8501d500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531e000 r8:8501d52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501d500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8501d500 r8:8027ecf4 r7:eb0ede60 r6:8501d580 r5:8531e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f5fb0 to 0xeb0f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501f200 Workqueue: events bpf_prog_free_deferred r4:e06cddc0 r5:84ff7f8c r4:84ff7c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:8531a400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:00000000 r9:8501d600 r8:8027ecf4 r7:eb0f5e60 r6:8501d680 r5:8531a400 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:85004e00 Not tainted 6.15.0-syzkaller #0 r5:85320c00 r4:829189bc r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501fd00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85320c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0773000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85386b8c r4:85386800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85386b8c r4:8501d700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85320c00 r8:8501d72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501d700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8501d700 r8:8027ecf4 r7:eb0fde60 r6:8501d780 r5:85320c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf3dfb0 to 0xeaf3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501f640 INFO: task kworker/1:633:4650 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r5:900f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85322400 r5:85322400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafade08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85322400 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa2b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538638c r4:85386000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8538638c r4:8501d800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85322400 r8:8501d82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501d800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8501d800 r8:8027ecf4 r7:eaf3de60 r6:8501d880 r5:85322400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafadfb0 to 0xeafadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501f800 INFO: task kworker/1:634:4652 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85320000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:636 state:D stack:0 pid:4657 tgid:4657 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85323000 r4:829189bc r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:8538738c r4:8501da00 Exception stack(0xeb109fb0 to 0xeb109ff8) r4:8501fcc0 Call trace: dd60: 900f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:637 state:D stack:0 pid:4658 tgid:4658 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85323c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8501db00 r8:8027ecf4 r7:eb109e60 r6:8501db80 r5:85323c00 r4:8501fd80 Call trace: dd60: 900f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85324800 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb081e08 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85324800 r8:8501dc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d49000 INFO: task kworker/1:638:4662 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:639:4663 blocked for more than 460 seconds. Workqueue: events bpf_prog_free_deferred r5:85325400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb111e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:640:4664 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:640 state:D stack:0 pid:4664 tgid:4664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb11dd84 r8:00000002 r7:60000013 r6:eb11dd8c r5:85326000 r4:85326000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85326000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d49400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85326000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea901000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85387f8c r4:85387c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85387f8c r4:8501de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85326000 r8:8501de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8501de00 r8:8027ecf4 r7:eb081e60 r6:8501de80 r5:85326000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb11dfb0 to 0xeb11dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 900f0113 ffffffff r4:e06cddc0 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85326c00 r4:829189bc r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85326c00 r8:8501df2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e06cddc0 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85321800 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb125e08 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85321800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea98d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538c38c r4:8538c000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8538c38c r4:84ca5000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85321800 r8:84ca502c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca5000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca5000 r8:8027ecf4 r7:eb119e60 r6:84ca5080 r5:85321800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb125fb0 to 0xeb125ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d494c0 INFO: task kworker/1:642:4668 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:643:4671 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:643 state:D stack:0 pid:4671 tgid:4671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:8531ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb129e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d49a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8531ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa79000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538cf8c r4:8538cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8538cf8c r4:84ca5100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531ec00 r8:84ca512c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca5100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca5100 r8:8027ecf4 r7:eb119e60 r6:84ca5180 r5:8531ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb129fb0 to 0xeb129ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d49700 INFO: task kworker/1:643:4671 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 INFO: task kworker/1:644:4672 blocked for more than 460 seconds. r5:85328000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d49980 r5:8538cb8c r4:8538c800 r10:00000000 r9:84ca5200 r8:8027ecf4 r7:eb129e60 r6:84ca5280 r5:85328000 INFO: task kworker/1:644:4672 is blocked on a mutex likely owned by task kworker/1:290:3848. r5:900f0113 r4:80239bb0 r4:e06cddc0 r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:645:4675 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:645 state:D stack:0 pid:4675 tgid:4675 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb12dd84 r8:00000002 r7:60000013 r6:eb12dd8c r5:85328c00 r4:85328c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85328c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb12de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d49d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85328c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab93000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538d78c r4:8538d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8538d78c r4:84ca5300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85328c00 r8:84ca532c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca5300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca5300 r8:8027ecf4 r7:eb129e60 r6:84ca5380 r5:85328c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb12dfb0 to 0xeb12dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d49840 INFO: task kworker/1:645:4675 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:646 state:D stack:0 pid:4677 tgid:4677 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85329800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb13de08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85329800 r8:84ca542c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe06cdd20 to 0xe06cdd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:647:4679 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:647 state:D stack:0 pid:4679 tgid:4679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb139d84 r8:00000002 r7:60000113 r6:eb139d8c r5:8532b000 r4:8532b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8532b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb139e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfb040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8532b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead69000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538ff8c r4:8538fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8538ff8c r4:84ca5500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8532b000 r8:84ca552c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca5500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca5500 r8:8027ecf4 r7:eb12de60 r6:84ca5580 r5:8532b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb139fb0 to 0xeb139ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:648 state:D stack:0 pid:4681 tgid:4681 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8532c800 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 900f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:649 state:D stack:0 pid:4683 tgid:4683 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8532d400 r4:829189bc r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:650:4685 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:650 state:D stack:0 pid:4685 tgid:4685 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb141d84 r8:00000002 r7:60000013 r6:eb141d8c r5:8532a400 r4:8532a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8532a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb141e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85015100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8532a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538e38c r4:8538e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8538e38c r4:84ca5800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8532a400 r8:84ca582c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca5800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca5800 r8:8027ecf4 r7:eb139e60 r6:84ca5880 r5:8532a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb141fb0 to 0xeb141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85015180 INFO: task kworker/1:650:4685 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:651:4687 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:651 state:D stack:0 pid:4687 tgid:4687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb151d84 r8:00000002 r7:60000013 r6:eb151d8c r5:8532ec00 r4:8532ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8532ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb151e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850152c0 r5:8538e78c r4:8538e400 r4:84ca5900 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:8532e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:653:4690 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:653 state:D stack:0 pid:4690 tgid:4690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb159d84 r8:00000002 r7:60000113 r6:eb159d8c r5:85330000 r4:85330000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85330000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb159e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85015ac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85330000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead0b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538f38c r4:8538f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8538f38c r4:84ca5b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85330000 r8:84ca5b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca5b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca5b00 r8:8027ecf4 r7:eb139e60 r6:84ca5b80 r5:85330000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb159fb0 to 0xeb159ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850153c0 INFO: task kworker/1:653:4690 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:126:4693 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:126 state:D stack:0 pid:4693 tgid:4693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb161d84 r8:00000002 r7:60000113 r6:eb161d8c r5:85330c00 r4:85330c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85330c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca4780 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:654:4695 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:654 state:D stack:0 pid:4695 tgid:4695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb165d84 r8:00000002 r7:60000013 r6:eb165d8c r5:85333000 r4:85333000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85333000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb165e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85015b40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85333000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 r5:8538f78c r4:8538f400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:654:4695 is blocked on a mutex likely owned by task kworker/1:290:3848. dd60: 900f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85333c00 r5:85333c00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb169e08 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85333c00 r8:84ca5dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85332400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb171e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfb5c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85332400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf0d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539878c r4:85398400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539878c r4:84ca5f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85332400 r8:84ca5f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca5f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca5f00 r8:8027ecf4 r7:eb139e60 r6:84ca5f80 r5:85332400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb171fb0 to 0xeb171ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dfb2c0 INFO: task kworker/1:656:4700 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:657:4701 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:657 state:D stack:0 pid:4701 tgid:4701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb175d84 r8:00000002 r7:60000013 r6:eb175d8c r5:85334800 r4:85334800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85334800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb175e08 r4:00000000 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfb1c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85334800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539838c r4:85398000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539838c r4:84ca5e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85334800 r8:84ca5eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca5e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ca5e80 r8:8027ecf4 r7:eb171e60 r6:85020000 r5:85334800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb175fb0 to 0xeb175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dfb300 INFO: task kworker/1:657:4701 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb14dd84 r8:00000002 r7:60000013 r6:eb14dd8c r5:85343c00 r4:85343c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85343c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb14de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfb6c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85343c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf1d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85398b8c r4:85398800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85398b8c r4:85020080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85343c00 r8:850200ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020080 r8:8027ecf4 r7:eb171e60 r6:845a3d80 r5:85343c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb14dfb0 to 0xeb14dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dfb580 INFO: task kworker/1:658:4704 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85331800 r5:85331800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:8539978c r4:85399400 r4:85020100 9fa0: 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eb181d84 r8:00000002 r7:60000113 r6:eb181d8c r5:85336c00 r5:85336c00 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541ad80 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabfd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c8f8c r4:852c8c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852c8f8c r4:845a3e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85336c00 r8:845a3e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:845a3e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845a3e00 r8:8027ecf4 r7:eafe1e60 r6:85020200 r5:85336c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb181fb0 to 0xeb181ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca4880 INFO: task kworker/0:127:4707 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:85335400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85335400 r8:850202ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:661 state:D stack:0 pid:4712 tgid:4712 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85336000 r4:829189bc r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85020380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020380 r8:8027ecf4 r7:eb179e60 r6:85020400 r5:85336000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb17dfb0 to 0xeb17dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dfba80 INFO: task kworker/1:661:4712 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:662:4715 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:662 state:D stack:0 pid:4715 tgid:4715 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:8532bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:853a8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:664:4717 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:664 state:D stack:0 pid:4717 tgid:4717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:853a8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb16de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85015640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb005000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85399f8c r4:85399c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85399f8c r4:85020680 r10:61c88647 r9:853a8c00 r8:850206ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:665 state:D stack:0 pid:4720 tgid:4720 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853a9800 r4:829189bc r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:8539ab8c r4:85020780 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:665:4720 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 INFO: task kworker/1:666:4721 blocked for more than 460 seconds. r5:853aa400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85014140 r7:ddde2d40 r6:83018200 r5:8539a78c r4:85020880 Exception stack(0xeb195fb0 to 0xeb195ff8) INFO: task kworker/1:666:4721 is blocked on a mutex likely owned by task kworker/1:290:3848. [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:667:4724 blocked for more than 460 seconds. r5:853abc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:8539b78c r4:8539b400 r4:85020980 dfa0: 00000000 00000000 00000000 00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:853ad400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541ac80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c8b8c r4:852c8800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852c8b8c r4:845a3e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ad400 r8:845a3eac r7:82804d40 r6:dddced40 r5:dddced60 r4:845a3e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845a3e80 r8:8027ecf4 r7:eb181e60 r6:85020a80 r5:853ad400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a1fb0 to 0xeb1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca4cc0 INFO: task kworker/0:128:4726 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:668:4727 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:668 state:D stack:0 pid:4727 tgid:4727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb1a5d84 r8:00000002 r7:60000013 r6:eb1a5d8c r5:853ab000 r4:853ab000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853ab000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850145c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:900f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:669:4728 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:669 state:D stack:0 pid:4728 tgid:4728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb1a9d84 r8:00000002 r7:60000113 r6:eb1a9d8c r5:853aec00 r4:853aec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853aec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85014880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb053000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8539b38c r4:8539b000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:670 state:D stack:0 pid:4731 tgid:4731 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:85020d00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e06cddc0 r5:00001000 r4:dfd83000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85014e00 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb08b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539bf8c r4:8539bc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539bf8c r4:85020e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b1800 r8:85020e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020e00 r8:8027ecf4 r7:eb1ade60 r6:85020e80 r5:853b1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b1fb0 to 0xeb1b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850149c0 INFO: task kworker/1:671:4733 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:672:4735 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:672 state:D stack:0 pid:4735 tgid:4735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb1b5d84 r8:00000002 r7:60000013 r6:eb1b5d8c r5:853b3000 r4:853b3000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853b3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85100340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85030b8c r4:85030800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85030b8c r4:85020f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b3000 r8:85020f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020f00 r8:8027ecf4 r7:eb1b1e60 r6:85020f80 r5:853b3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b5fb0 to 0xeb1b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85014d40 INFO: task kworker/1:672:4735 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:674:4739 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:674 state:D stack:0 pid:4739 tgid:4739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb1b9d84 r8:00000002 r7:60000113 r6:eb1b9d8c r5:853b3c00 r4:853b3c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853b3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851001c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:82ac11e4 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84ff7f8c r4:84ff7c00 Exception stack(0xe06cdfb0 to 0xe06cdff8) Not tainted 6.15.0-syzkaller #0 r5:853b4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8503138c r4:85102200 Exception stack(0xeb1c5fb0 to 0xeb1c5ff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501e100 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85100400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85030f8c r4:85030c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85030f8c r4:85102300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b5400 r8:8510232c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85102300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85102300 r8:8027ecf4 r7:eb1c5e60 r6:85102380 r5:853b5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d9fb0 to 0xeb1d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85100440 INFO: task kworker/1:676:4743 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:677 state:D stack:0 pid:4746 tgid:4746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb1e1d84 r8:00000002 r7:60000113 r6:eb1e1d8c r5:853b6000 r4:853b6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853b6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85100700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503178c r4:85031400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503178c r4:85102480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b6000 r8:851024ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85102480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85102480 r8:8027ecf4 r7:eb1c5e60 r6:85102500 r5:853b6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e1fb0 to 0xeb1e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851009c0 INFO: task kworker/1:677:4746 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eb1edd84 r8:00000002 r7:60000113 r6:eb1edd8c r5:853b6c00 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85031b8c r4:85031800 r4:85102400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7f699000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:679:4749 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:679 state:D stack:0 pid:4749 tgid:4749 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb1f9d84 r8:00000002 r7:60000013 r6:eb1f9d8c r5:85343000 r4:85343000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85343000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018205 r8:85343000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 Exception stack(0xeb1f9fb0 to 0xeb1f9ff8) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8501e100 r4:85341800 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85100b40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85341800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb201000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503238c r4:85032000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503238c r4:85102680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85341800 r8:851026ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85102680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85102680 r8:8027ecf4 r7:eb1f9e60 r6:845a3f80 r5:85341800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb211fb0 to 0xeb211ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85100a40 INFO: task kworker/1:680:4752 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85340c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85032b8c r4:85032800 r10:00000000 r9:85102700 r8:8027ecf4 r7:eb211e60 r6:85419000 r5:85340c00 r4:85100b80 Workqueue: events bpf_prog_free_deferred dd60: 900f0113 ffffffff r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r4:00000000 r5:84ff7f8c r4:84ff7c00 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:683:4756 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:683 state:D stack:0 pid:4756 tgid:4756 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb22dd84 r8:00000002 r7:60000113 r6:eb22dd8c r5:85342400 r4:85342400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85342400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb22de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85014f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85342400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb239000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503338c r4:85033000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503338c r4:85102800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85342400 r8:8510282c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85102800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85102800 r8:8027ecf4 r7:eb215e60 r6:85419100 r5:85342400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb22dfb0 to 0xeb22dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 dd60: 900f0113 ffffffff [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8501e100 task:kworker/1:684 state:D stack:0 pid:4758 tgid:4758 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb23dfb0 to 0xeb23dff8) Workqueue: events bpf_prog_free_deferred [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfd83000 r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:685:4762 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:685 state:D stack:0 pid:4762 tgid:4762 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb259d84 r8:00000002 r7:60000113 r6:eb259d8c r5:85349800 r4:85349800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85349800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb259e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541b640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85349800 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb27f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502878c r4:85028400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502878c r4:85102900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85349800 r8:8510292c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85102900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85102900 r8:8027ecf4 r7:eb22de60 r6:85419200 r5:85349800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb259fb0 to 0xeb259ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8541b000 INFO: task kworker/1:685:4762 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:84ff7f8c r4:84ff7c00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:686:4763 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:686 state:D stack:0 pid:4763 tgid:4763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb25dd84 r8:00000002 r7:60000113 r6:eb25dd8c r5:8534a400 r4:8534a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8534a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb25de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541b040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8534a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb24b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503378c r4:85033400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503378c r4:85102980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534a400 r8:851029ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85102980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85102980 r8:8027ecf4 r7:eb259e60 r6:85419280 r5:8534a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb25dfb0 to 0xeb25dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8541b100 INFO: task kworker/1:686:4763 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 r5:00001000 r4:eb251000 r7:ddde2d40 r6:83018200 r5:85033b8c r4:85102a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85348000 r8:85102a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85102a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85102a00 r8:8027ecf4 r7:eb259e60 r6:85419300 r5:85348000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb269fb0 to 0xeb269ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8541b100 INFO: task kworker/1:687:4765 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541b2c0 r5:85033f8c r4:85033c00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/1:689:4768 blocked for more than 461 seconds. r10:829189c0 r9:eb275d84 r8:00000002 r7:60000113 r6:eb275d8c r5:853ac800 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85102b80 r8:8027ecf4 r7:eb259e60 r6:85102c00 r5:853ac800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb275fb0 to 0xeb275ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8541b300 INFO: task kworker/1:689:4768 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 INFO: task kworker/1:690:4771 blocked for more than 461 seconds. r4:853b8000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541b900 r7:ddde2d40 r6:83018200 r5:85028b8c r4:85102d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:692 state:D stack:0 pid:4776 tgid:4776 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541bac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04e3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85028f8c r4:85028c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85028f8c r4:85102e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853bb000 r8:85102eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85102e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85102e80 r8:8027ecf4 r7:eb1cde60 r6:85102f00 r5:853bb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8541bb40 INFO: task kworker/1:692:4776 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:693:4778 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:693 state:D stack:0 pid:4778 tgid:4778 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb295d84 r8:00000002 r7:60000013 r6:eb295d8c r5:853b9800 r4:853b9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853b9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb295e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85100f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502978c r4:85029400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502978c r4:85102f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b9800 r8:85102fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85102f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85102f80 r8:8027ecf4 r7:eb1cde60 r6:85427000 r5:853b9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb295fb0 to 0xeb295ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8541ba00 INFO: task kworker/1:693:4778 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:694:4780 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:694 state:D stack:0 pid:4780 tgid:4780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb29dd84 r8:00000002 r7:60000113 r6:eb29dd8c r5:853bd400 r4:853bd400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853bd400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85420640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae27000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502ab8c r4:8502a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502ab8c r4:85427080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853bd400 r8:854270ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85427080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427080 r8:8027ecf4 r7:eb295e60 r6:85427100 r5:853bd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb29dfb0 to 0xeb29dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 Not tainted 6.15.0-syzkaller #0 r4:8534bc00 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85502280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8534bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd97000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ca78c r4:852ca400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852ca78c r4:85419380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534bc00 r8:854193ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85419380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85419380 r8:8027ecf4 r7:eb181e60 r6:85419400 r5:8534bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb27dfb0 to 0xeb27dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8541ad00 INFO: task kworker/0:129:4782 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85004e00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:130 state:D stack:0 pid:4784 tgid:4784 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541ab00 r7:dddced40 r6:83018000 r5:852c938c r4:85419480 Exception stack(0xeb28dfb0 to 0xeb28dff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:695:4785 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:695 state:D stack:0 pid:4785 tgid:4785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb2a5d84 r8:00000002 r7:60000113 r6:eb2a5d8c r5:8534c800 r4:8534c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8534c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85420000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8534c800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac21000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85029b8c r4:85029800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85029b8c r4:85427180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534c800 r8:854271ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85427180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427180 r8:8027ecf4 r7:eb29de60 r6:85419580 r5:8534c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a5fb0 to 0xeb2a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:85029f8c r4:85427200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534d400 r8:8542722c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85427200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427200 r8:8027ecf4 r7:eb29de60 r6:85419600 r5:8534d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a1fb0 to 0xeb2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85420200 INFO: task kworker/1:696:4788 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/0:131:4789 blocked for more than 461 seconds. r5:8534e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85226ac0 r5:852c9f8c r4:852c9c00 r4:85419680 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:84ff7f8c r4:84ff7c00 r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/1:697:4792 blocked for more than 461 seconds. r4:8534ec00 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:00001000 r4:eadf7000 r7:ddde2d40 r6:83018200 r5:8502a38c r4:85427280 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:85348c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85348c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854205c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85348c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae13000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502a78c r4:8502a400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502a78c r4:85427300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85348c00 r8:8542732c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85427300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427300 r8:8027ecf4 r7:eb29de60 r6:85419800 r5:85348c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b5fb0 to 0xeb2b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85420200 INFO: task kworker/1:698:4793 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:699:4796 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:699 state:D stack:0 pid:4796 tgid:4796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb2b9d84 r8:00000002 r7:60000113 r6:eb2b9d8c r5:85345400 r4:85345400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85345400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85420740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85345400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae3d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502af8c r4:8502ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502af8c r4:85427380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85345400 r8:854273ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85427380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427380 r8:8027ecf4 r7:eb29de60 r6:85419880 r5:85345400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b9fb0 to 0xeb2b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85420700 INFO: task kworker/1:699:4796 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854208c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cc0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae53000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502b38c r4:8502b000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502b38c r4:85427480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cc0c00 r8:854274ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85427480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427480 r8:8027ecf4 r7:eb2b9e60 r6:85419900 r5:84cc0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c5fb0 to 0xeb2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85420b40 INFO: task kworker/1:700:4799 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Not tainted 6.15.0-syzkaller #0 r5:84cc1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eae6b000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d5e08 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:853e578c r4:85427500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cc3000 r8:8542752c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85427500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427500 r8:8027ecf4 r7:eb2c9e60 r6:85419a00 r5:84cc3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d5fb0 to 0xeb2d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854209c0 INFO: task kworker/1:702:4802 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:703:4803 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:703 state:D stack:0 pid:4803 tgid:4803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb2d9d84 r8:00000002 r7:60000113 r6:eb2d9d8c r5:84cc0000 r4:84cc0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cc0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85420b80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cc0000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae7b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502bb8c r4:8502b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84cc0000 r8:854275ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 dd60: 900f0113 ffffffff [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84ff7f8c r4:84ff7c00 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:704:4805 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:704 state:D stack:0 pid:4805 tgid:4805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb2e1d84 r8:00000002 r7:60000113 r6:eb2e1d8c r5:84cc2400 r4:84cc2400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cc2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85420c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cc2400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502bf8c r4:8502bc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502bf8c r4:85427600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cc2400 r8:8542762c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85427600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427600 r8:8027ecf4 r7:eb2d5e60 r6:85419b00 r5:84cc2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e1fb0 to 0xeb2e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85420a80 INFO: task kworker/1:704:4805 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06cdfb0 to 0xe06cdff8) Not tainted 6.15.0-syzkaller #0 r10:829189c0 r9:eb2e9d84 r8:00000002 r7:60000113 r6:eb2e9d8c r5:84cc3c00 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85420e40 r7:ddde2d40 r6:83018200 r5:853e438c r4:85427680 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:706:4810 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:706 state:D stack:0 pid:4810 tgid:4810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb2f5d84 r8:00000002 r7:60000013 r6:eb2f5d8c r5:84cc4800 r4:84cc4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cc4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85420f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cc4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e478c r4:853e4400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e478c r4:85427700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cc4800 r8:8542772c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85427700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427700 r8:8027ecf4 r7:eb2d5e60 r6:85419c00 r5:84cc4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f5fb0 to 0xeb2f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85420d80 INFO: task kworker/1:706:4810 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:707:4811 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:707 state:D stack:0 pid:4811 tgid:4811 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb2a9d84 r8:00000002 r7:60000113 r6:eb2a9d8c r5:853bc800 r4:853bc800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853bc800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541be40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e4b8c r4:853e4800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e4b8c r4:85427780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853bc800 r8:854277ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85427780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427780 r8:8027ecf4 r7:eb2d5e60 r6:85427800 r5:853bc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a9fb0 to 0xeb2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8541bec0 INFO: task kworker/1:707:4811 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e06cddc0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85431040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb101000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e4f8c r4:853e4c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e4f8c r4:85427880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ba400 r8:854278ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85427880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427880 r8:8027ecf4 r7:eb2d5e60 r6:85427900 r5:853ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f9fb0 to 0xeb2f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85431280 INFO: task kworker/1:708:4814 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:709:4816 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:709 state:D stack:0 pid:4816 tgid:4816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb2fdd84 r8:00000002 r7:60000013 r6:eb2fdd8c r5:853bec00 r4:853bec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:853e538c r4:85427980 Exception stack(0xeb2fdfb0 to 0xeb2fdff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85431540 r5:853e5b8c r4:853e5800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85450000 r8:85427aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85427a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427a80 r8:8027ecf4 r7:eb2d5e60 r6:85427b00 r5:85450000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb315fb0 to 0xeb315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85431340 INFO: task kworker/1:710:4819 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854317c0 r5:853e5f8c r4:853e5c00 r4:85427b80 Exception stack(0xeb319fb0 to 0xeb319ff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:712 state:D stack:0 pid:4822 tgid:4822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb321d84 r8:00000002 r7:60000113 r6:eb321d8c r5:85452400 r4:85452400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85452400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb321e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85431bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85452400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb331000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e678c r4:853e6400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e678c r4:85427c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85452400 r8:85427cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85427c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427c80 r8:8027ecf4 r7:eb319e60 r6:85427d00 r5:85452400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb321fb0 to 0xeb321ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85431780 INFO: task kworker/1:712:4822 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) r4:8501e100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854319c0 r5:853e638c r4:853e6000 r10:61c88647 r9:85453c00 r8:85427dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:714 state:D stack:0 pid:4825 tgid:4825 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84cc5400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85427e80 r8:8027ecf4 r7:eb321e60 r6:85419c80 r5:84cc5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb33dfb0 to 0xeb33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85431b80 INFO: task kworker/1:714:4825 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:715:4828 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:715 state:D stack:0 pid:4828 tgid:4828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb349d84 r8:00000002 r7:60000113 r6:eb349d8c r5:84cc6000 r4:84cc6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cc6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb349e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85431c80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cc6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb33f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e6b8c r4:853e6800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e6b8c r4:85427f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cc6000 r8:85427f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85346000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541a0c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85346000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb357000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e738c r4:853e7000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e738c r4:85427f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85346000 r8:85427fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85427f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427f80 r8:8027ecf4 r7:eb33de60 r6:85419d80 r5:85346000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb365fb0 to 0xeb365ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8541a100 INFO: task kworker/1:716:4830 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:717:4832 blocked for more than 461 seconds. task:kworker/1:717 state:D stack:0 pid:4832 tgid:4832 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:841b0c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:853e778c r4:85438000 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 900f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:718:4835 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:718 state:D stack:0 pid:4835 tgid:4835 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb399d84 r8:00000002 r7:60000113 r6:eb399d8c r5:841b0000 r4:841b0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841b0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb399e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542f380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:841b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb379000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e7f8c r4:853e7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e7f8c r4:85438080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841b0000 r8:854380ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85438080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85438080 r8:8027ecf4 r7:eb38de60 r6:85419e80 r5:841b0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb399fb0 to 0xeb399ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8542f2c0 INFO: task kworker/1:718:4835 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:82ac11e4 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:841b3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501e100 Workqueue: events bpf_prog_free_deferred r5:841b3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:841b3c00 r8:854381ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85438180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85438180 r8:8027ecf4 r7:eb399e60 r6:85443000 r5:841b3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3b9fb0 to 0xeb3b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8542f2c0 INFO: task kworker/1:720:4838 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:721:4839 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:721 state:D stack:0 pid:4839 tgid:4839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb3c5d84 r8:00000002 r7:60000113 r6:eb3c5d8c r5:841b4800 r4:841b4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841b4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542f480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:841b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3bb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e838c r4:853e8000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e838c r4:85438200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841b4800 r8:8543822c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85438200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85438200 r8:8027ecf4 r7:eb3b9e60 r6:85443080 r5:841b4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c5fb0 to 0xeb3c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8542f340 INFO: task kworker/1:721:4839 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:722:4842 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:722 state:D stack:0 pid:4842 tgid:4842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb3d5d84 r8:00000002 r7:60000113 r6:eb3d5d8c r5:841b1800 r4:841b1800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841b1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d5e08 r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 900f0113 ffffffff r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:723:4843 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:723 state:D stack:0 pid:4843 tgid:4843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb3e1d84 r8:00000002 r7:60000013 r6:eb3e1d8c r5:841b2400 r4:841b2400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841b2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542f6c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:841b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3d7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e8b8c r4:853e8800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e8b8c r4:85438300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841b2400 r8:8543832c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85438300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85438300 r8:8027ecf4 r7:eb3b9e60 r6:85443180 r5:841b2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e1fb0 to 0xeb3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:723:4843 is blocked on a mutex likely owned by task kworker/1:290:3848. r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/1:724:4846 blocked for more than 461 seconds. r5:841b5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018205 r8:841b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0eb000 r4:85438380 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb205fb0 to 0xeb205ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8542fa80 INFO: task kworker/1:724:4846 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:725:4848 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:725 state:D stack:0 pid:4848 tgid:4848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb225d84 r8:00000002 r7:60000113 r6:eb225d8c r5:841b6000 r4:841b6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841b6000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85438400 r8:8027ecf4 r7:eb3b9e60 r6:85443280 r5:841b6000 INFO: task kworker/1:725:4848 is blocked on a mutex likely owned by task kworker/1:290:3848. [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 Not tainted 6.15.0-syzkaller #0 r4:85358c00 r5:85358c00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb245e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542fb00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85358c00 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc8b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e978c r4:853e9400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e978c r4:85438480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85358c00 r8:854384ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85438480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85438480 r8:8027ecf4 r7:eb3b9e60 r6:85443300 r5:85358c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb245fb0 to 0xeb245ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8542f8c0 INFO: task kworker/1:726:4850 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:8535a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8450d000 r5:853eaf8c r4:853eac00 r4:85438500 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 900f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:84ff7f8c r4:84ff7c00 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:728 state:D stack:0 pid:4853 tgid:4853 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85358000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018205 r8:85358000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 r10:61c88647 r9:85358000 r8:854385ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:729:4856 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:729 state:D stack:0 pid:4856 tgid:4856 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb3fdd84 r8:00000002 r7:60000113 r6:eb3fdd8c r5:85359800 r4:85359800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85359800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3fde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542fe00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85359800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8895000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ea38c r4:853ea000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ea38c r4:85438600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85359800 r8:8543862c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85438600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85438600 r8:8027ecf4 r7:eb261e60 r6:85443480 r5:85359800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3fdfb0 to 0xeb3fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8542fcc0 INFO: task kworker/1:729:4856 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:730:4857 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:730 state:D stack:0 pid:4857 tgid:4857 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb401d84 r8:00000002 r7:60000013 r6:eb401d8c r5:8535b000 r4:8535b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8535b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb401e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85421d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8535b000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88df000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ea78c r4:853ea400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ea78c r4:85438680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8535b000 r8:854386ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85438680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85438680 r8:8027ecf4 r7:eb261e60 r6:85443500 r5:8535b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb401fb0 to 0xeb401ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred dd60: 900f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8535e000 r5:8535e000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85431ec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8535e000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea977000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853eab8c r4:853ea800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853eab8c r4:85438700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8535e000 r8:8543872c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85438700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85438700 r8:8027ecf4 r7:eb261e60 r6:85443580 r5:8535e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb40dfb0 to 0xeb40dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8450d0c0 INFO: task kworker/1:731:4860 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8535c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:8501e100 task:kworker/1:733 state:D stack:0 pid:4865 tgid:4865 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8535bc00 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8450d1c0 r7:ddde2d40 r6:83018200 r5:853eb38c r4:85438800 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:734:4866 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:734 state:D stack:0 pid:4866 tgid:4866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb425d84 r8:00000002 r7:60000113 r6:eb425d8c r5:84cc6c00 r4:84cc6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cc6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb425e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8450d500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cc6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac65000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ebf8c r4:853ebc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ebf8c r4:85438880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cc6c00 r8:854388ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85438880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85438880 r8:8027ecf4 r7:eb415e60 r6:85443700 r5:84cc6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb425fb0 to 0xeb425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8450d180 INFO: task kworker/1:734:4866 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 900f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8535ec00 r5:8535ec00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb431e08 r9:83018205 r8:8535ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r10:61c88647 r9:8535ec00 r8:8543892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 dd60: 900f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:736:4870 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:736 state:D stack:0 pid:4870 tgid:4870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb435d84 r8:00000002 r7:60000013 r6:eb435d8c r5:84c30000 r4:84c30000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c30000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb435e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c30000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf53000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ee38c r4:853ee000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ee38c r4:85438980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c30000 r8:854389ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85438980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85438980 r8:8027ecf4 r7:eb425e60 r6:85443800 r5:84c30000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb435fb0 to 0xeb435ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8450d540 INFO: task kworker/1:736:4870 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:737:4872 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:737 state:D stack:0 pid:4872 tgid:4872 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb439d84 r8:00000002 r7:60000113 r6:eb439d8c r5:84c30c00 r4:84c30c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c30c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8450d640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c30c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacbf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ec38c r4:853ec000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ec38c r4:85438a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c30c00 r8:85438a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85438a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85438a00 r8:8027ecf4 r7:eb435e60 r6:85443880 r5:84c30c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb439fb0 to 0xeb439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8450d680 INFO: task kworker/1:737:4872 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:84c32400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb441e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85438a80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:739:4875 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:739 state:D stack:0 pid:4875 tgid:4875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb445d84 r8:00000002 r7:60000113 r6:eb445d8c r5:84c33000 r4:84c33000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c33000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:84c31800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8450da80 r7:ddde2d40 r6:83018200 r5:853ecf8c r4:85438b80 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:741:4879 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:741 state:D stack:0 pid:4879 tgid:4879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb42dd84 r8:00000002 r7:60000013 r6:eb42dd8c r5:85454800 r4:85454800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85454800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb42de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8501e100 task:kworker/1:742 state:D stack:0 pid:4881 tgid:4881 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85455400 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb455e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85455400 r8:85438d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85456000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853edb8c r4:853ed800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853edb8c r4:85438e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85456000 r8:85438e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85438e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85438e00 r8:8027ecf4 r7:eb435e60 r6:85438e80 r5:85456000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb459fb0 to 0xeb459ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8541a100 INFO: task kworker/1:743:4884 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:744:4886 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:744 state:D stack:0 pid:4886 tgid:4886 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb45dd84 r8:00000002 r7:60000113 r6:eb45dd8c r5:85451800 r4:85451800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85451800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541a340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85451800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf2d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853edf8c r4:853edc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853edf8c r4:85438f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85451800 r8:85438f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85438f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85438f00 r8:8027ecf4 r7:eb435e60 r6:85438f80 r5:85451800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb45dfb0 to 0xeb45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501e100 task:kworker/1:745 state:D stack:0 pid:4889 tgid:4889 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85453000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb355e08 r9:83018205 r8:85453000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85461440 INFO: task kworker/1:745:4889 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:746:4891 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:746 state:D stack:0 pid:4891 tgid:4891 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb461d84 r8:00000002 r7:60000013 r6:eb461d8c r5:85456c00 r4:85456c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85456c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854611c0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:747:4892 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:747 state:D stack:0 pid:4892 tgid:4892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb465d84 r8:00000002 r7:60000113 r6:eb465d8c r5:841b6c00 r4:841b6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841b6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb465e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:841b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb00d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853eef8c r4:853eec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853eef8c r4:85460200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841b6c00 r8:8546022c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85460200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85460200 r8:8027ecf4 r7:eb355e60 r6:85460280 r5:841b6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb465fb0 to 0xeb465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:8501e100 task:kworker/1:748 state:D stack:0 pid:4896 tgid:4896 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853ae000 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461680 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:749:4897 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:749 state:D stack:0 pid:4897 tgid:4897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb46dd84 r8:00000002 r7:60000013 r6:eb46dd8c r5:853bbc00 r4:853bbc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853bbc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb037000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ef78c r4:853ef400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ef78c r4:85460480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853bbc00 r8:854604ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85460480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85460480 r8:8027ecf4 r7:eb469e60 r6:85460500 r5:853bbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb46dfb0 to 0xeb46dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854614c0 INFO: task kworker/1:749:4897 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:750:4898 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:750 state:D stack:0 pid:4898 tgid:4898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb471d84 r8:00000002 r7:60000113 r6:eb471d8c r5:853be000 r4:853be000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853be000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb471e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 dd20: 7fe06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:751:4900 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:751 state:D stack:0 pid:4900 tgid:4900 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb475d84 r8:00000002 r7:60000013 r6:eb475d8c r5:85458000 r4:85458000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85458000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb475e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461b80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85458000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r7:ddde2d40 r6:83018200 r5:853eff8c r4:85460600 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:82ac11e4 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 task:kworker/1:752 state:D stack:0 pid:4902 tgid:4902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb479d84 r8:00000002 r7:60000113 r6:eb479d8c r5:85458c00 r4:85458c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85458c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb479e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544aa80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85458c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb131000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f4b8c r4:853f4800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f4b8c r4:85460700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85458c00 r8:8546072c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85460700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85460700 r8:8027ecf4 r7:eb475e60 r6:85460780 r5:85458c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb479fb0 to 0xeb479ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85461b40 INFO: task kworker/1:752:4902 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 INFO: task kworker/1:753:4904 blocked for more than 461 seconds. r4:85459800 r5:85459800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85460800 r8:8027ecf4 r7:eb479e60 r6:85460900 r5:85459800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb47dfb0 to 0xeb47dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85461c80 INFO: task kworker/1:753:4904 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:8545a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb481e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85460880 r8:8027ecf4 r7:eb479e60 r6:85460980 r5:8545a400 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:00000001 r4:8501e100 Workqueue: events bpf_prog_free_deferred r5:8545b000 r4:829189bc r4:00000000 r5:00001000 r4:eb1bd000 r4:85460a00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r4:00000000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:756:4910 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:756 state:D stack:0 pid:4910 tgid:4910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb489d84 r8:00000002 r7:60000113 r6:eb489d8c r5:8545bc00 r4:8545bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8545bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb489e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85476280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8545bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f578c r4:853f5400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f578c r4:85460b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8545bc00 r8:85460b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85460b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85460b00 r8:8027ecf4 r7:eb485e60 r6:85460b80 r5:8545bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb489fb0 to 0xeb489ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85476100 INFO: task kworker/1:756:4910 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:757:4912 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:757 state:D stack:0 pid:4912 tgid:4912 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb495d84 r8:00000002 r7:60000113 r6:eb495d8c r5:84c36c00 r4:84c36c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c36c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854761c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c36c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f538c r4:853f5000 r7:ddde2d40 r6:83018200 r5:853f538c r4:85460c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c36c00 r8:85460c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85460c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85460c00 r8:8027ecf4 r7:eb489e60 r6:85443a80 r5:84c36c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb495fb0 to 0xeb495ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85476180 INFO: task kworker/1:757:4912 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb49dd84 r8:00000002 r7:60000113 r6:eb49dd8c r5:84c36000 r4:84c36000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c36000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85476480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c36000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f5b8c r4:853f5800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f5b8c r4:85460c80 r10:00000000 r9:85460c80 r8:8027ecf4 r7:eb489e60 r6:85443b00 r5:84c36000 INFO: task kworker/1:758:4914 is blocked on a mutex likely owned by task kworker/1:290:3848. r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:759 state:D stack:0 pid:4917 tgid:4917 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84c34800 r4:829189bc r4:00000000 r9:83018205 r8:84c34800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 r7:ddde2d40 r6:83018200 r5:853f5f8c r4:85460d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c34800 r8:85460d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85460d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85460d00 r8:8027ecf4 r7:eb49de60 r6:85443b80 r5:84c34800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a9fb0 to 0xeb4a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854763c0 INFO: task kworker/1:759:4917 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/1:760:4918 blocked for more than 461 seconds. r5:8535d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85476880 r7:ddde2d40 r6:83018200 r5:853f678c r4:85460d80 Exception stack(0xeb4adfb0 to 0xeb4adff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06cdfb0 to 0xe06cdff8) Not tainted 6.15.0-syzkaller #0 r4:84c35400 r5:84c35400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r5:853f638c r4:853f6000 r10:61c88647 r9:84c35400 r8:85460e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:762:4922 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:762 state:D stack:0 pid:4922 tgid:4922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb4b5d84 r8:00000002 r7:60000113 r6:eb4b5d8c r5:84c33c00 r4:84c33c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c33c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85476840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c33c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb24d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f6f8c r4:853f6c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f6f8c r4:85460e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c33c00 r8:85460eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85460e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85460e80 r8:8027ecf4 r7:eb4ade60 r6:85443d00 r5:84c33c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b5fb0 to 0xeb4b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85476840 INFO: task kworker/1:762:4922 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 800f0113 ffffffff r4:00000000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8545c800 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:764:4925 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:764 state:D stack:0 pid:4925 tgid:4925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb4a5d84 r8:00000002 r7:60000013 r6:eb4a5d8c r5:8545ec00 r4:8545ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8545ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85476dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8545ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb255000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f738c r4:853f7000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f738c r4:85222000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8545ec00 r8:8522202c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85222000 r10:00000000 r9:85222000 r8:8027ecf4 r7:eb4b5e60 r6:85222080 r5:8545ec00 r4:85476b40 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 r5:84ff7f8c r4:84ff7c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8545e000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018205 r8:8545e000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 Exception stack(0xeb4b9fb0 to 0xeb4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854769c0 INFO: task kworker/1:765:4927 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85004e00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:8545d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:767:4932 blocked for more than 462 seconds. r5:853c8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85221040 r7:ddde2d40 r6:83018200 r5:853f7b8c r4:85222300 Exception stack(0xeb4c1fb0 to 0xeb4c1ff8) INFO: task kworker/1:767:4932 is blocked on a mutex likely owned by task kworker/1:290:3848. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06cdfb0 to 0xe06cdff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84e91800 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85221400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e91800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540038c r4:85400000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540038c r4:85222400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e91800 r8:8522242c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85222400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85222400 r8:8027ecf4 r7:eb4b9e60 r6:85443d80 r5:84e91800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e5fb0 to 0xeb2e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852213c0 INFO: task kworker/1:768:4935 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:769:4937 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:769 state:D stack:0 pid:4937 tgid:4937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb2edd84 r8:00000002 r7:60000113 r6:eb2edd8c r5:84e92400 r4:84e92400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e92400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ede08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8540078c r4:85222480 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85004e00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:770:4939 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:770 state:D stack:0 pid:4939 tgid:4939 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb391d84 r8:00000002 r7:60000013 r6:eb391d8c r5:84e90c00 r4:84e90c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e90c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb391e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85221780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e90c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaac9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85400f8c r4:85400c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85400f8c r4:85222500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e90c00 r8:8522252c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85222500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85222500 r8:8027ecf4 r7:eb4b9e60 r6:85443e80 r5:84e90c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb391fb0 to 0xeb391ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852214c0 INFO: task kworker/1:770:4939 is blocked on a mutex likely owned by task kworker/1:290:3848. Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e90000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d5fb0 to 0xeb4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85221880 INFO: task kworker/1:771:4941 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84e93000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:85221840 Call trace: dd60: 800f0113 ffffffff r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84e93c00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85221a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e93c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac23000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540178c r4:85401400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540178c r4:85222680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e93c00 r8:852226ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85222680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85222680 r8:8027ecf4 r7:eb4d5e60 r6:85205000 r5:84e93c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e5fb0 to 0xeb4e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852217c0 INFO: task kworker/1:773:4945 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 800f0113 ffffffff r4:e06cddc0 r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84e94800 r5:84e94800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84e94800 r8:8522272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84e95400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85222800 r8:8027ecf4 r7:eb4d5e60 r6:85205100 r5:84e95400 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:776:4951 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:776 state:D stack:0 pid:4951 tgid:4951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb4fdd84 r8:00000002 r7:60000013 r6:eb4fdd8c r5:84e96000 r4:84e96000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e96000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4fde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546b3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e96000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae85000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85402b8c r4:85402800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85402b8c r4:85222780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e96000 r8:852227ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85222780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85222780 r8:8027ecf4 r7:eb4d5e60 r6:85205180 r5:84e96000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4fdfb0 to 0xeb4fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85221cc0 INFO: task kworker/1:776:4951 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 r5:84ff7f8c r4:84ff7c00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829189c0 r9:eb505d84 r8:00000002 r7:60000013 r6:eb505d8c r5:853c0c00 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85222880 r8:8027ecf4 r7:eb4fde60 r6:85205200 r5:853c0c00 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:853c1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85200640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb36d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ca38c r4:852ca000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:853c1800 r8:852052ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85226a80 Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r4:e06cddc0 r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:853c2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85402f8c r4:85402c00 r10:00000000 r9:85222900 r8:8027ecf4 r7:eb4fde60 r6:85205380 r5:853c2400 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:779:4960 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:779 state:D stack:0 pid:4960 tgid:4960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb50dd84 r8:00000002 r7:60000013 r6:eb50dd8c r5:853c3000 r4:853c3000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853c3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb50de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85476740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaecb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540338c r4:85403000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540338c r4:85222980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c3000 r8:852229ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85222980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85222980 r8:8027ecf4 r7:eb509e60 r6:85205400 r5:853c3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb50dfb0 to 0xeb50dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85221300 INFO: task kworker/1:779:4960 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:780:4962 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:780 state:D stack:0 pid:4962 tgid:4962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb511d84 r8:00000002 r7:60000113 r6:eb511d8c r5:853c3c00 r4:853c3c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853c3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb511e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:85221200 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:781:4964 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:781 state:D stack:0 pid:4964 tgid:4964 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:853c4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:782:4966 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:782 state:D stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb51dd84 r8:00000002 r7:60000113 r6:eb51dd8c r5:853c6000 r4:853c6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853c6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521d3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r7:ddde2d40 r6:83018200 r5:8540438c r4:85222b00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 dfa0: 00000000 00000000 00000000 00000000 r10:829189c0 r9:eb529d84 r8:00000002 r7:60000113 r6:eb529d8c r5:853c0000 r5:853c0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85403f8c r4:85222b80 9fa0: 00000000 00000000 00000000 00000000 Call trace: r5:800f0113 r4:80239bb0 r4:e06cddc0 r5:00001000 r4:dfd83000 r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:784:4970 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:784 state:D stack:0 pid:4970 tgid:4970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb52dd84 r8:00000002 r7:60000113 r6:eb52dd8c r5:84e96c00 r4:84e96c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e96c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb52de08 r4:00000000 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:8540478c r4:85222c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85480c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 r5:85480000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521d800 r10:61c88647 r9:85480000 r8:85222d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85222d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85222d00 r8:8027ecf4 r7:eb535e60 r6:85205780 r5:85480000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb541fb0 to 0xeb541ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8521d6c0 INFO: task kworker/1:786:4975 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:787:4976 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:787 state:D stack:0 pid:4976 tgid:4976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb545d84 r8:00000002 r7:60000113 r6:eb545d8c r5:85481800 r4:85481800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85481800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb545e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521d980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85481800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb337000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540538c r4:85405000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540538c r4:85222d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85481800 r8:85222dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85222d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85222d80 r8:8027ecf4 r7:eb541e60 r6:85205800 r5:85481800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb545fb0 to 0xeb545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8521d6c0 INFO: task kworker/1:787:4976 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0113 r4:80239bb0 r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85483c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521de80 r7:ddde2d40 r6:83018200 r5:8540638c r4:85222e00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb54dfb0 to 0xeb54dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8521dac0 INFO: task kworker/1:788:4978 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:84ff7f8c r4:84ff7c00 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:789 state:D stack:0 pid:4980 tgid:4980 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85482400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521db00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85482400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb343000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540578c r4:85405400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540578c r4:85222f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85482400 r8:85222f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85222f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85222f00 r8:8027ecf4 r7:eb54de60 r6:85205900 r5:85482400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb555fb0 to 0xeb555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:790:4981 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:790 state:D stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb559d84 r8:00000002 r7:60000113 r6:eb559d8c r5:85483000 r4:85483000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85483000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/1:791:4984 blocked for more than 462 seconds. r5:85484800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521dd80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85484800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb383000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85405f8c r4:85405c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85405f8c r4:85222f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85484800 r8:85222fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85222f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85222f80 r8:8027ecf4 r7:eb54de60 r6:85205a00 r5:85484800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb561fb0 to 0xeb561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8521dc40 INFO: task kworker/1:791:4984 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85486000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502c280 r10:61c88647 r9:85486000 r8:85205aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85200540 Exception stack(0xe06cdd20 to 0xe06cdd68) r5:800f0113 r4:80239bb0 r4:82ac11e4 r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:792 state:D stack:0 pid:4988 tgid:4988 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85485400 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520b340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85485400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb59d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85407b8c r4:85407800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85407b8c r4:85210000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85485400 r8:8521002c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85210000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85210000 r8:8027ecf4 r7:eb54de60 r6:85205b80 r5:85485400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb56dfb0 to 0xeb56dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8521de00 INFO: task kworker/1:792:4988 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06cdfb0 to 0xe06cdff8) Not tainted 6.15.0-syzkaller #0 r4:85486c00 r5:85486c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:8540678c r4:85406400 r4:85210080 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829189c0 r9:eb57dd84 r8:00000002 r7:60000113 r6:eb57dd8c r5:84d68000 r5:84d68000 r4:829189bc [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85406b8c r4:85406800 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:795:4993 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:795 state:D stack:0 pid:4993 tgid:4993 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb581d84 r8:00000002 r7:60000113 r6:eb581d8c r5:84d68c00 r4:84d68c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d68c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb581e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852268c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d68c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3e7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85406f8c r4:85406c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85406f8c r4:85210180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d68c00 r8:852101ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85210180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85210180 r8:8027ecf4 r7:eb56de60 r6:85205d00 r5:84d68c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb581fb0 to 0xeb581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8521d100 INFO: task kworker/1:795:4993 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d6b000 r5:84d6b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb595e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520b000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d6b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb585000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540738c r4:85407000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540738c r4:85210200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d6b000 r8:8521022c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85210200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85210200 r8:8027ecf4 r7:eb56de60 r6:85205d80 r5:84d6b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb595fb0 to 0xeb595ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:797:4997 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:797 state:D stack:0 pid:4997 tgid:4997 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb5a1d84 r8:00000002 r7:60000113 r6:eb5a1d8c r5:84d69800 r4:84d69800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d69800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520b180 r7:ddde2d40 r6:83018200 r5:8540778c r4:85210280 r10:00000000 r9:85210280 r8:8027ecf4 r7:eb56de60 r6:85205e00 r5:84d69800 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:798:5000 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:798 state:D stack:0 pid:5000 tgid:5000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb5add84 r8:00000002 r7:60000013 r6:eb5add8c r5:84d6c800 r4:84d6c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d6c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ade08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520b5c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb5adfb0 to 0xeb5adff8) Workqueue: events bpf_prog_free_deferred r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000001 r4:8501e100 Workqueue: events bpf_prog_free_deferred [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853cb000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb591e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520b440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5af000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85407f8c r4:85407c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85407f8c r4:85210380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853cb000 r8:852103ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85210380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85210380 r8:8027ecf4 r7:eb5ade60 r6:85210400 r5:853cb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb591fb0 to 0xeb591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:853cbc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8540878c r4:85408400 Exception stack(0xeb5a9fb0 to 0xeb5a9ff8) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:853cc800 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r5:85408b8c r4:85408800 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:802:5008 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:802 state:D stack:0 pid:5008 tgid:5008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb5c1d84 r8:00000002 r7:60000013 r6:eb5c1d8c r5:853cd400 r4:853cd400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853cd400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520bd40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5eb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540978c r4:85409400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540978c r4:85210680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853cd400 r8:852106ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85210680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85210680 r8:8027ecf4 r7:eb5b9e60 r6:85210700 r5:853cd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c1fb0 to 0xeb5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8520ba00 INFO: task kworker/1:802:5008 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:803 state:D stack:0 pid:5009 tgid:5009 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520ba80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d6d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85408f8c r4:85408c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85408f8c r4:85210780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d6d400 r8:852107ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85210780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85210780 r8:8027ecf4 r7:eb5c1e60 r6:85205f00 r5:84d6d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e1fb0 to 0xeb5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8520ba00 INFO: task kworker/1:803:5009 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r10:829189c0 r9:eb5e5d84 r8:00000002 r7:60000013 r6:eb5e5d8c r5:84d6e000 r4:84d6e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d6e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520bc40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d6e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5dd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540938c r4:85409000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540938c r4:85210800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d6e000 r8:8521082c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85210800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85210800 r8:8027ecf4 r7:eb5c1e60 r6:85205f80 r5:84d6e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfd83000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520be00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d6ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85409b8c r4:85409800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85409b8c r4:85210880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d6ec00 r8:852108ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85210880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85210880 r8:8027ecf4 r7:eb5c1e60 r6:85501000 r5:84d6ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f5fb0 to 0xeb5f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8520bdc0 INFO: task kworker/1:805:5014 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 dd60: 800f0113 ffffffff r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/1:806:5016 blocked for more than 462 seconds. [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:8540a78c r4:85210900 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 800f0113 ffffffff r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:808:5019 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:808 state:D stack:0 pid:5019 tgid:5019 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb3f5d84 r8:00000002 r7:60000013 r6:eb3f5d8c r5:853c6c00 r4:853c6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853c6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85500680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88b9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540ab8c r4:8540a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540ab8c r4:85210a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c6c00 r8:85210a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85210a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85210a00 r8:8027ecf4 r7:eb5fde60 r6:85501180 r5:853c6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f5fb0 to 0xeb3f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85500340 INFO: task kworker/1:808:5019 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:84ff7f8c r4:84ff7c00 r4:85004e00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:809:5024 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:809 state:D stack:0 pid:5024 tgid:5024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb4bdd84 r8:00000002 r7:60000113 r6:eb4bdd8c r5:84cb0000 r4:84cb0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cb0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4bde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855007c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cb0000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea95d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540af8c r4:8540ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540af8c r4:85210a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cb0000 r8:85210aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85210a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85210a80 r8:8027ecf4 r7:eb3f5e60 r6:85501200 r5:84cb0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4bdfb0 to 0xeb4bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85500640 INFO: task kworker/1:809:5024 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe06cdd20 to 0xe06cdd68) [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829189c0 r9:eb60dd84 r8:00000002 r7:60000113 r6:eb60dd8c r5:84cb2400 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85500480 INFO: task kworker/1:810:5027 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85500480 INFO: task kworker/1:811:5028 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501e100 task:kworker/1:812 state:D stack:0 pid:5029 tgid:5029 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8540b78c r4:85210c80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) Not tainted 6.15.0-syzkaller #0 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r7:ddde2d40 r6:83018200 r5:8540bb8c r4:85210d80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:134:5033 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:134 state:D stack:0 pid:5033 tgid:5033 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550c580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb019000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540df8c r4:8540dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8540df8c r4:85501300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c8c00 r8:8550132c r7:82804d40 r6:dddced40 r5:dddced60 r4:85501300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85501300 r8:8027ecf4 r7:eb569e60 r6:85210e80 r5:853c8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb405fb0 to 0xeb405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85502780 INFO: task kworker/0:134:5033 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06cdfb0 to 0xe06cdff8) task:kworker/1:814 state:D stack:0 pid:5036 tgid:5036 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/1:815:5037 blocked for more than 462 seconds. r4:853d0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb619e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85200a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead25000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540c78c r4:8540c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540c78c r4:85505000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d0000 r8:8550502c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85505000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85505000 r8:8027ecf4 r7:eb615e60 r6:85505080 r5:853d0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb619fb0 to 0xeb619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85500dc0 INFO: task kworker/1:815:5037 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550c000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540cf8c r4:8540cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540cf8c r4:85505100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d0c00 r8:8550512c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85505100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85505100 r8:8027ecf4 r7:eb619e60 r6:85505180 r5:853d0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb61dfb0 to 0xeb61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85500dc0 INFO: task kworker/1:816:5039 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r10:829189c0 r9:eb611d84 r8:00000002 r7:60000113 r6:eb611d8c r5:853d1800 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520bfc0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/1:818:5043 blocked for more than 462 seconds. [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550c4c0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r4:00000000 r5:84ff7f8c r4:84ff7c00 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:819:5046 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:819 state:D stack:0 pid:5046 tgid:5046 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb62dd84 r8:00000002 r7:60000113 r6:eb62dd8c r5:853d3000 r4:853d3000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550c140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf3f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540d38c r4:8540d000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540d38c r4:85505400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d3000 r8:8550542c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85505400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85505400 r8:8027ecf4 r7:eb621e60 r6:85505480 r5:853d3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb62dfb0 to 0xeb62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550c080 INFO: task kworker/1:819:5046 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8037d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:820:5047 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:820 state:D stack:0 pid:5047 tgid:5047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb625d84 r8:00000002 r7:60000013 r6:eb625d8c r5:853d3c00 r4:853d3c00 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb625e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550c300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf7b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540d78c r4:8540d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540d78c r4:85505500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d3c00 r8:8550552c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85505500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85505500 r8:8027ecf4 r7:eb621e60 r6:85505580 r5:853d3c00 Exception stack(0xeb625fb0 to 0xeb625ff8) Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb631e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550c780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb03f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540e38c r4:8540e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540e38c r4:85505600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d4800 r8:8550562c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85505600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85505600 r8:8027ecf4 r7:eb621e60 r6:85505680 r5:853d4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb631fb0 to 0xeb631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550c2c0 INFO: task kworker/1:821:5049 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85501380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:822 state:D stack:0 pid:5053 tgid:5053 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85505780 r8:8027ecf4 r7:eb631e60 r6:85505800 r5:853d6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb635fb0 to 0xeb635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550c840 INFO: task kworker/1:822:5053 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 dd60: 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:84ff7f8c r4:84ff7c00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:853d8000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:825:5059 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:825 state:D stack:0 pid:5059 tgid:5059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb645d84 r8:00000002 r7:60000013 r6:eb645d8c r5:853d8c00 r4:853d8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb645e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551fd40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3eb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553a38c r4:8553a000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553a38c r4:85505b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d8c00 r8:85505b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85505b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85505b00 r8:8027ecf4 r7:eb641e60 r6:85505b80 r5:853d8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb645fb0 to 0xeb645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550cc80 INFO: task kworker/1:825:5059 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:826:5060 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84cb3000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:8540f38c r4:8540f000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/1:827 state:D stack:0 pid:5062 tgid:5062 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cb0c00 r8:85505aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85505a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85505a80 r8:8027ecf4 r7:eb645e60 r6:85501480 r5:84cb0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb655fb0 to 0xeb655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85221cc0 INFO: task kworker/1:827:5062 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ff7f8c r4:84ff7c00 dfa0: 00000000 00000000 00000000 00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85505c80 r8:8027ecf4 r7:eb645e60 r6:85501500 r5:84cb1800 r4:8550cf80 r4:00000000 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:84ff7f8c r4:84ff7c00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:829:5066 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:829 state:D stack:0 pid:5066 tgid:5066 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb665d84 r8:00000002 r7:60000113 r6:eb665d8c r5:84cb3c00 r4:84cb3c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cb3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551f100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84cb3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb207000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540ff8c r4:8540fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540ff8c r4:85505d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cb3c00 r8:85505dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85505d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85505d80 r8:8027ecf4 r7:eb645e60 r6:85501580 r5:84cb3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb665fb0 to 0xeb665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8551f280 INFO: task kworker/1:829:5066 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829189c0 r9:eb66dd84 r8:00000002 r7:60000113 r6:eb66dd8c r5:84cb4800 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r4:00000000 r5:00001000 r4:eb219000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r4:00000000 r5:00001000 r4:eb22f000 r7:ddde2d40 r6:83018200 r5:8553878c r4:85505e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cb5400 r8:85505e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85505e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85505e00 r8:8027ecf4 r7:eb645e60 r6:85501680 r5:84cb5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb675fb0 to 0xeb675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8551f200 INFO: task kworker/1:831:5070 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:832:5073 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:832 state:D stack:0 pid:5073 tgid:5073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb681d84 r8:00000002 r7:60000113 r6:eb681d8c r5:84cb6000 r4:84cb6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cb6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb681e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85538b8c r4:85505e80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb685e08 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85505f00 r8:8027ecf4 r7:eb645e60 r6:85501780 r5:85498000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb685fb0 to 0xeb685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8551f500 INFO: task kworker/1:833:5074 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:834:5077 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeb691fb0 to 0xeb691ff8) r4:00000000 r4:e06cddc0 r5:84ff7f8c r4:84ff7c00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018205 r8:85498c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 r10:61c88647 r9:85498c00 r8:8552c02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:836:5080 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:836 state:D stack:0 pid:5080 tgid:5080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb6a1d84 r8:00000002 r7:60000113 r6:eb6a1d8c r5:85499800 r4:85499800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85499800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551fa80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85499800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2bb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85539b8c r4:85539800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85539b8c r4:8552c080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85499800 r8:8552c0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552c080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552c080 r8:8027ecf4 r7:eb645e60 r6:85501900 r5:85499800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a1fb0 to 0xeb6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8551f8c0 INFO: task kworker/1:836:5080 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:837:5083 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:837 state:D stack:0 pid:5083 tgid:5083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb6a5d84 r8:00000002 r7:60000013 r6:eb6a5d8c r5:8549b000 r4:8549b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8549b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551fb40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8549b000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85539f8c r4:85539c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85539f8c r4:8552c100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549b000 r8:8552c12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552c100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552c100 r8:8027ecf4 r7:eb645e60 r6:85501980 r5:8549b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a5fb0 to 0xeb6a5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:838:5085 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:838 state:D stack:0 pid:5085 tgid:5085 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb6a9d84 r8:00000002 r7:60000013 r6:eb6a9d8c r5:8549c800 r4:8549c800 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb6a9fb0 to 0xeb6a9ff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:8553a78c r4:8553a400 r4:00000001 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:852cab8c r4:852ca800 r4:00000001 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:eb429000 r4:00000001 r4:85502440 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:842 state:D stack:0 pid:5091 tgid:5091 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85430280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8549bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb499000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553b38c r4:8553b000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553b38c r4:8552c380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549bc00 r8:8552c3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552c380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552c380 r8:8027ecf4 r7:eb6b1e60 r6:85501c00 r5:8549bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b9fb0 to 0xeb6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85430000 INFO: task kworker/1:842:5091 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r4:e06cddc0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85430240 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:844 state:D stack:0 pid:5097 tgid:5097 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:845:5098 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:845 state:D stack:0 pid:5098 tgid:5098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb6c5d84 r8:00000002 r7:60000013 r6:eb6c5d8c r5:854a0000 r4:854a0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854a0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85430500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553bb8c r4:8553b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553bb8c r4:8552c500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a0000 r8:8552c52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552c500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552c500 r8:8027ecf4 r7:eb6c1e60 r6:85501d80 r5:854a0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c5fb0 to 0xeb6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85430300 INFO: task kworker/1:845:5098 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) Not tainted 6.15.0-syzkaller #0 r5:854a0c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:847:5103 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:847 state:D stack:0 pid:5103 tgid:5103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb6ddd84 r8:00000002 r7:60000113 r6:eb6ddd8c r5:854a1800 r4:854a1800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854a1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:854a1800 r8:8552c62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:854a2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551ff80 r7:ddde2d40 r6:83018200 r5:8553d78c r4:8552c680 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:849:5106 blocked for more than 463 seconds. r5:854a3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85430940 r10:61c88647 r9:854a3000 r8:8552c72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:850:5108 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:850 state:D stack:0 pid:5108 tgid:5108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb6f9d84 r8:00000002 r7:60000113 r6:eb6f9d8c r5:854a3c00 r4:854a3c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854a3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85430a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6ed000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553cf8c r4:8553cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553cf8c r4:8552c780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a3c00 r8:8552c7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552c780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552c780 r8:8027ecf4 r7:eb6e5e60 r6:85425000 r5:854a3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f9fb0 to 0xeb6f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85430ac0 INFO: task kworker/1:850:5108 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) task:kworker/1:851 state:D stack:0 pid:5111 tgid:5111 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854a4800 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:136:5115 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:136 state:D stack:0 pid:5115 tgid:5115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb501d84 r8:00000002 r7:60000113 r6:eb501d8c r5:854a5400 r4:854a5400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854a5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb501e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fa0: 00000000 00000000 00000000 00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e06cddc0 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829189c0 r9:eb651d84 r8:00000002 r7:60000113 r6:eb651d8c r5:854a6000 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85425200 r8:8027ecf4 r7:eb501e60 r6:85425280 r5:854a6000 Workqueue: events bpf_prog_free_deferred r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 Workqueue: events bpf_prog_free_deferred r5:854a6c00 r4:829189bc r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502c800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae87000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cbf8c r4:852cbc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852cbf8c r4:85425300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a6c00 r8:8542532c r7:82804d40 r6:dddced40 r5:dddced60 r4:85425300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85425300 r8:8027ecf4 r7:eb651e60 r6:85425380 r5:854a6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb531fb0 to 0xeb531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502c300 INFO: task kworker/0:138:5117 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:852:5120 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:852 state:D stack:0 pid:5120 tgid:5120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb539d84 r8:00000002 r7:60000013 r6:eb539d8c r5:84d30000 r4:84d30000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d30000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb539e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552b200 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d30000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae5d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84d30000 r8:8552c8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84d30c00 r5:84d30c00 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeb565fb0 to 0xeb565ff8) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:854:5124 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:854 state:D stack:0 pid:5124 tgid:5124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb525d84 r8:00000002 r7:60000013 r6:eb525d8c r5:84d31800 r4:84d31800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d31800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r5:00001000 r4:dfd83000 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829189c0 r9:eb589d84 r8:00000002 r7:60000013 r6:eb589d8c r5:84d32400 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d32400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553e78c r4:8553e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553e78c r4:8552ca00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d32400 r8:8552ca2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552ca00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552ca00 r8:8027ecf4 r7:eb525e60 r6:85425580 r5:84d32400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb589fb0 to 0xeb589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8552b0c0 INFO: task kworker/1:855:5126 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e06cddc0 r5:84ff7f8c r4:84ff7c00 Exception stack(0xe06cdfb0 to 0xe06cdff8) r10:829189c0 r9:eb575d84 r8:00000002 r7:60000113 r6:eb575d8c r5:84d33000 r5:84d33000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb575e08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84d33c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:00000000 r9:85425680 r8:8027ecf4 r7:eb651e60 r6:85425700 r5:84d33c00 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e06cddc0 r5:00001000 r4:dfd83000 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84d34800 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:84d34800 r8:8552cb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:140:5134 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:140 state:D stack:0 pid:5134 tgid:5134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb701d84 r8:00000002 r7:60000113 r6:eb701d8c r5:84d35400 r4:84d35400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d35400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb701e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85525bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d35400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c06f8c r4:84c06c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c06f8c r4:85425800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d35400 r8:8542582c r7:82804d40 r6:dddced40 r5:dddced60 r4:85425800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85425800 r8:8027ecf4 r7:eb5cde60 r6:85425880 r5:84d35400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb701fb0 to 0xeb701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502cc40 INFO: task kworker/0:140:5134 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb705d84 r8:00000002 r7:60000113 r6:eb705d8c r5:84d36000 r4:84d36000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d36000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb705e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552b840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84d36000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb301000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553ef8c r4:8553ec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553ef8c r4:8552cb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d36000 r8:8552cbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552cb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552cb80 r8:8027ecf4 r7:eb6fde60 r6:85425900 r5:84d36000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb705fb0 to 0xeb705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:859 state:D stack:0 pid:5137 tgid:5137 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84d36c00 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8552cc00 r8:8027ecf4 r7:eb6fde60 r6:85425980 r5:84d36c00 Call trace: dd60: 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:854a8000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb70de08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8552b780 INFO: task kworker/1:860:5139 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:861:5142 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:861 state:D stack:0 pid:5142 tgid:5142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:854aa400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:854aa400 r8:8552cd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:861:5142 is blocked on a mutex likely owned by task kworker/1:290:3848. [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:862:5144 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:862 state:D stack:0 pid:5144 tgid:5144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb721d84 r8:00000002 r7:60000113 r6:eb721d8c r5:854ab000 r4:854ab000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854ab000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552bd80 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb367000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553ff8c r4:8553fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553ff8c r4:8552cd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ab000 r8:8552cdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552cd80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552cd80 r8:8027ecf4 r7:eb719e60 r6:85425b00 r5:854ab000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb721fb0 to 0xeb721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8552bec0 INFO: task kworker/1:862:5144 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:854a9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:853da400 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85430d80 INFO: task kworker/1:864:5147 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:865:5151 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:865 state:D stack:0 pid:5151 tgid:5151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb725d84 r8:00000002 r7:60000113 r6:eb725d8c r5:853db000 r4:853db000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853db000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb725e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85540f8c r4:85540c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb725fb0 to 0xeb725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8542e080 INFO: task kworker/1:865:5151 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r4:e06cddc0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:853dbc00 r5:853dbc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb731e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542e500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85541b8c r4:85541800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb731fb0 to 0xeb731ff8) Workqueue: events bpf_prog_free_deferred r5:800f0113 r4:80239bb0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:853dc800 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542e200 r10:61c88647 r9:853dc800 r8:854291ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8542e1c0 INFO: task kworker/1:867:5154 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:853dd400 r4:829189bc r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeb73dfb0 to 0xeb73dff8) INFO: task kworker/1:868:5156 is blocked on a mutex likely owned by task kworker/1:290:3848. [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853de000 r5:853de000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb711e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85429380 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:870:5160 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:870 state:D stack:0 pid:5160 tgid:5160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb741d84 r8:00000002 r7:60000013 r6:eb741d8c r5:853dec00 r4:853dec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853dec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb741e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542e840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb519000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/1:871 state:D stack:0 pid:5162 tgid:5162 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:872:5163 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:872 state:D stack:0 pid:5163 tgid:5163 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85570000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb74de08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfa0: 00000000 00000000 00000000 00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r5:84ff7f8c r4:84ff7c00 Exception stack(0xe06cdfb0 to 0xe06cdff8) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb751d84 r8:00000002 r7:60000013 r6:eb751d8c r5:85572400 r4:85572400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85572400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb751e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542edc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85572400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb577000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85542f8c r4:85542c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85542f8c r4:85429780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85572400 r8:854297ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85429780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85429780 r8:8027ecf4 r7:eb74de60 r6:85429800 r5:85572400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb751fb0 to 0xeb751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8542ebc0 INFO: task kworker/1:873:5167 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r5:00001000 r4:dfd83000 r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:85573000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb755e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500e040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85573000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb58b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554338c r4:85543000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554338c r4:85429880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:875:5169 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:875 state:D stack:0 pid:5169 tgid:5169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb759d84 r8:00000002 r7:60000013 r6:eb759d8c r5:85573c00 r4:85573c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85573c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb759e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500e2c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85573c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb59b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554378c r4:85543400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554378c r4:85429980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85573c00 r8:854299ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85429980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85429980 r8:8027ecf4 r7:eb755e60 r6:85429a00 r5:85573c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb759fb0 to 0xeb759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500e000 INFO: task kworker/1:875:5169 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85570c00 r5:85570c00 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85525c80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85570c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c06b8c r4:84c06800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84c06b8c r4:85429a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85570c00 r8:85429aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85429a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85429a80 r8:8027ecf4 r7:eb759e60 r6:85429b00 r5:85570c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb75dfb0 to 0xeb75dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500e100 INFO: task kworker/1:876:5172 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85574800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r7:ddde2d40 r6:83018200 r5:85543b8c r4:85429b80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 INFO: task kworker/1:878:5175 blocked for more than 463 seconds. r4:85571800 r5:85571800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85550b8c r4:85550800 r4:85429c80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:879:5178 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:879 state:D stack:0 pid:5178 tgid:5178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb76dd84 r8:00000002 r7:60000013 r6:eb76dd8c r5:85576000 r4:85576000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85576000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb76de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500edc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85576000 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbfd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85543f8c r4:85543c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85543f8c r4:85429d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85576000 r8:85429dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85429d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85429d80 r8:8027ecf4 r7:eb765e60 r6:85429e00 r5:85576000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb76dfb0 to 0xeb76dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 80a32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8501e100 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:141 state:D stack:0 pid:5180 tgid:5180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb775d84 r8:00000002 r7:60000013 r6:eb775d8c r5:85578000 r4:85578000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85578000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb775e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85525cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85578000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa5d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c0778c r4:84c07400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c0778c r4:85425c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85578000 r8:85425c2c r7:82804d40 r6:dddced40 r5:dddced60 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:141:5180 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85579800 r5:85579800 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb77de08 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c0638c r4:84c06000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c0638c r4:85425c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85579800 r8:85425cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85425c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85425c80 r8:8027ecf4 r7:eb775e60 r6:85429f00 r5:85579800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb77dfb0 to 0xeb77dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85525f00 INFO: task kworker/0:142:5181 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r4:85004e00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:880 state:D stack:0 pid:5185 tgid:5185 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85578c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85578c00 r8:85429fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:143:5188 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:143 state:D stack:0 pid:5188 tgid:5188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb761d84 r8:00000002 r7:60000113 r6:eb761d8c r5:8557b000 r4:8557b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8557b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb761e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85525140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8557b000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab9b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d438c r4:854d4000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d438c r4:85425d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8557b000 r8:85425d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85425d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85425d00 r8:8027ecf4 r7:dfaa5e60 r6:8552e080 r5:8557b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb761fb0 to 0xeb761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85525ac0 INFO: task kworker/0:143:5188 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:881:5189 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:881 state:D stack:0 pid:5189 tgid:5189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb769d84 r8:00000002 r7:60000113 r6:eb769d8c r5:8557bc00 r4:8557bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8557bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb769e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500ea00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8557bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88f7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555078c r4:85550400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555078c r4:8552e100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8557bc00 r8:8552e12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552e100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552e100 r8:8027ecf4 r7:eb765e60 r6:8552e180 r5:8557bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb769fb0 to 0xeb769ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500ef80 INFO: task kworker/1:881:5189 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:882:5191 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:882 state:D stack:0 pid:5191 tgid:5191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb679d84 r8:00000002 r7:60000113 r6:eb679d8c r5:8557c800 r4:8557c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8557c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850170c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8557c800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead17000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85550f8c r4:85550c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85550f8c r4:8552e200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8557c800 r8:8552e22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552e200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552e200 r8:8027ecf4 r7:eb765e60 r6:8552e280 r5:8557c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb679fb0 to 0xeb679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8542ed80 INFO: task kworker/1:882:5191 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:144:5193 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:144 state:D stack:0 pid:5193 tgid:5193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb789d84 r8:00000002 r7:60000113 r6:eb789d8c r5:8557ec00 r4:8557ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8557ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb789e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e075c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8557ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d478c r4:854d4400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d478c r4:85425d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8557ec00 r8:85425dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85425d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85425d80 r8:8027ecf4 r7:dfaa5e60 r6:8552e300 r5:8557ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb789fb0 to 0xeb789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e076c0 INFO: task kworker/0:144:5193 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:883:5196 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:883 state:D stack:0 pid:5196 tgid:5196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb78dd84 r8:00000002 r7:60000013 r6:eb78dd8c r5:8557a400 r4:8557a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8557a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb78de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85017340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8557a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead5f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555138c r4:85551000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555138c r4:8552e380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8557a400 r8:8552e3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552e380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552e380 r8:8027ecf4 r7:eb679e60 r6:8552e400 r5:8557a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb78dfb0 to 0xeb78dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85017080 INFO: task kworker/1:883:5196 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:884:5198 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:884 state:D stack:0 pid:5198 tgid:5198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb791d84 r8:00000002 r7:60000013 r6:eb791d8c r5:85576c00 r4:85576c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85576c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb791e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850176c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85576c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf97000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555178c r4:85551400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555178c r4:8552e480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85576c00 r8:8552e4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552e480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552e480 r8:8027ecf4 r7:eb78de60 r6:8552e500 r5:85576c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb791fb0 to 0xeb791ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85017300 INFO: task kworker/1:884:5198 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:145:5199 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:145 state:D stack:0 pid:5199 tgid:5199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb795d84 r8:00000002 r7:60000113 r6:eb795d8c r5:85575400 r4:85575400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85575400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb795e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85575400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf1b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d4b8c r4:854d4800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d4b8c r4:85425e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85575400 r8:85425e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85425e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85425e00 r8:8027ecf4 r7:dfaa5e60 r6:8552e580 r5:85575400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb795fb0 to 0xeb795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e076c0 INFO: task kworker/0:145:5199 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:146:5201 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:146 state:D stack:0 pid:5201 tgid:5201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb79dd84 r8:00000002 r7:60000113 r6:eb79dd8c r5:8557e000 r4:8557e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8557e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb79de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa180 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8557e000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb00f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d4f8c r4:854d4c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d4f8c r4:85425e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8557e000 r8:85425eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85425e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85425e80 r8:8027ecf4 r7:dfaa5e60 r6:8552e600 r5:8557e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb79dfb0 to 0xeb79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dfa080 INFO: task kworker/0:146:5201 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:885:5203 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:885 state:D stack:0 pid:5203 tgid:5203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7a1d84 r8:00000002 r7:60000113 r6:eb7a1d8c r5:85580c00 r4:85580c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85580c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85017c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85580c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb077000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85551f8c r4:85551c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85551f8c r4:8552e680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85580c00 r8:8552e6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552e680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552e680 r8:8027ecf4 r7:eb791e60 r6:8552e700 r5:85580c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a1fb0 to 0xeb7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85017680 INFO: task kworker/1:885:5203 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:147:5205 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:147 state:D stack:0 pid:5205 tgid:5205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7a9d84 r8:00000002 r7:60000113 r6:eb7a9d8c r5:85582400 r4:85582400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85582400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfaa80 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:886:5206 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:886 state:D stack:0 pid:5206 tgid:5206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb689d84 r8:00000002 r7:60000013 r6:eb689d8c r5:854ad400 r4:854ad400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854ad400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb689e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85017bc0 r4:00000000 r9:83018205 r8:854ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb045000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85551b8c r4:85551800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85551b8c r4:8552e800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ad400 r8:8552e82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552e800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552e800 r8:8027ecf4 r7:eb7a1e60 r6:85425f80 r5:854ad400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb689fb0 to 0xeb689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85017600 INFO: task kworker/1:886:5206 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85004e00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:887:5210 blocked for more than 463 seconds. r10:829189c0 r9:eb7b1d84 r8:00000002 r7:60000113 r6:eb7b1d8c r5:854aec00 r5:854aec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b1e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb187000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8552e880 r8:8027ecf4 r7:eb7a1e60 r6:84ffc000 r5:854aec00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:888:5211 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:888 state:D stack:0 pid:5211 tgid:5211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7b5d84 r8:00000002 r7:60000113 r6:eb7b5d8c r5:854ac800 r4:854ac800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854ac800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85017f00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555278c r4:85552400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555278c r4:8552e900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ac800 r8:8552e92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552e900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552e900 r8:8027ecf4 r7:eb7b1e60 r6:84ffc080 r5:854ac800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b5fb0 to 0xeb7b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85017c80 INFO: task kworker/1:888:5211 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:889:5214 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:889 state:D stack:0 pid:5214 tgid:5214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7c1d84 r8:00000002 r7:60000113 r6:eb7c1d8c r5:854abc00 r4:854abc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854abc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850179c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1f1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85552b8c r4:85552800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85552b8c r4:8552e980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854abc00 r8:8552e9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552e980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552e980 r8:8027ecf4 r7:eb7b5e60 r6:84ffc100 r5:854abc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c1fb0 to 0xeb7c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85017e40 INFO: task kworker/1:889:5214 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:890:5215 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:890 state:D stack:0 pid:5215 tgid:5215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7c5d84 r8:00000002 r7:60000113 r6:eb7c5d8c r5:854a8c00 r4:854a8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854a8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500c040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85552f8c r4:85552c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85552f8c r4:8552ea00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a8c00 r8:8552ea2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552ea00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552ea00 r8:8027ecf4 r7:eb7c1e60 r6:84ffc180 r5:854a8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c5fb0 to 0xeb7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85017f80 INFO: task kworker/1:890:5215 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:891:5217 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:891 state:D stack:0 pid:5217 tgid:5217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7c9d84 r8:00000002 r7:60000013 r6:eb7c9d8c r5:855a8000 r4:855a8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500c580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3e3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85553b8c r4:85553800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85553b8c r4:8552ea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a8000 r8:8552eaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552ea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552ea80 r8:8027ecf4 r7:eb7c5e60 r6:84ffc200 r5:855a8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c9fb0 to 0xeb7c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500c100 INFO: task kworker/1:891:5217 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:892:5219 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:892 state:D stack:0 pid:5219 tgid:5219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7cdd84 r8:00000002 r7:60000013 r6:eb7cdd8c r5:855a8c00 r4:855a8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7cde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500c200 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb235000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555338c r4:85553000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555338c r4:8552eb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a8c00 r8:8552eb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552eb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552eb00 r8:8027ecf4 r7:eb7c9e60 r6:84ffc280 r5:855a8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7cdfb0 to 0xeb7cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500c280 INFO: task kworker/1:892:5219 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:893:5222 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:893 state:D stack:0 pid:5222 tgid:5222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7bdd84 r8:00000002 r7:60000113 r6:eb7bdd8c r5:855a9800 r4:855a9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7bde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500c280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb265000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d578c r4:854d5400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854d578c r4:8552eb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a9800 r8:8552ebac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552eb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552eb80 r8:8027ecf4 r7:eb7c9e60 r6:84ffc380 r5:855a9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7bdfb0 to 0xeb7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500c000 INFO: task kworker/1:893:5222 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:894:5223 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:894 state:D stack:0 pid:5223 tgid:5223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7d1d84 r8:00000002 r7:60000113 r6:eb7d1d8c r5:855aa400 r4:855aa400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855aa400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500c480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb285000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555378c r4:85553400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555378c r4:8552ec00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855aa400 r8:8552ec2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552ec00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552ec00 r8:8027ecf4 r7:eb7c9e60 r6:84ffc400 r5:855aa400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d1fb0 to 0xeb7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500c500 INFO: task kworker/1:894:5223 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:895:5226 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:895 state:D stack:0 pid:5226 tgid:5226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7d9d84 r8:00000002 r7:60000113 r6:eb7d9d8c r5:855abc00 r4:855abc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855abc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500cc40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85558f8c r4:85558c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85558f8c r4:8552ec80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855abc00 r8:8552ecac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552ec80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552ec80 r8:8027ecf4 r7:eb7c9e60 r6:84ffc480 r5:855abc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d9fb0 to 0xeb7d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500c640 INFO: task kworker/1:895:5226 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:896:5228 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:896 state:D stack:0 pid:5228 tgid:5228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7e1d84 r8:00000002 r7:60000013 r6:eb7e1d8c r5:855ad400 r4:855ad400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ad400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500c6c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb407000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85553f8c r4:85553c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85553f8c r4:8552ed00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ad400 r8:8552ed2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552ed00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552ed00 r8:8027ecf4 r7:eb7d9e60 r6:84ffc500 r5:855ad400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e1fb0 to 0xeb7e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500c640 INFO: task kworker/1:896:5228 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:897:5229 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:897 state:D stack:0 pid:5229 tgid:5229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7e5d84 r8:00000002 r7:60000013 r6:eb7e5d8c r5:855ab000 r4:855ab000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ab000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500c7c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb41d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555838c r4:85558000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555838c r4:8552ed80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ab000 r8:8552edac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552ed80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552ed80 r8:8027ecf4 r7:eb7d9e60 r6:84ffc580 r5:855ab000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e5fb0 to 0xeb7e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500c940 INFO: task kworker/1:897:5229 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:898:5232 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:898 state:D stack:0 pid:5232 tgid:5232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7f1d84 r8:00000002 r7:60000013 r6:eb7f1d8c r5:84e70000 r4:84e70000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e70000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500c980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e70000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb43d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555878c r4:85558400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555878c r4:8552ee00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e70000 r8:8552ee2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552ee00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552ee00 r8:8027ecf4 r7:eb7d9e60 r6:84ffc600 r5:84e70000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f1fb0 to 0xeb7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500c740 INFO: task kworker/1:898:5232 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:148:5233 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:148 state:D stack:0 pid:5233 tgid:5233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7f5d84 r8:00000002 r7:60000113 r6:eb7f5d8c r5:84e70c00 r4:84e70c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e70c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84589500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2f1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d5f8c r4:854d5c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d5f8c r4:84ffc680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e70c00 r8:84ffc6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffc680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffc680 r8:8027ecf4 r7:dfaa5e60 r6:84ffc700 r5:84e70c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f5fb0 to 0xeb7f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dfafc0 INFO: task kworker/0:148:5233 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:899:5234 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:899 state:D stack:0 pid:5234 tgid:5234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7a5d84 r8:00000002 r7:60000113 r6:eb7a5d8c r5:85583000 r4:85583000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85583000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500ca40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85583000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb49f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85558b8c r4:85558800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85558b8c r4:8552ee80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85583000 r8:8552eeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552ee80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552ee80 r8:8027ecf4 r7:eb7d9e60 r6:8552ef00 r5:85583000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a5fb0 to 0xeb7a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500c8c0 INFO: task kworker/1:899:5234 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:900:5238 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:900 state:D stack:0 pid:5238 tgid:5238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7edd84 r8:00000002 r7:60000013 r6:eb7edd8c r5:85583c00 r4:85583c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85583c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ede08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500cf00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85583c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb629000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555978c r4:85559400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555978c r4:8552ef80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85583c00 r8:8552efac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8552ef80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552ef80 r8:8027ecf4 r7:eb7d9e60 r6:84dab000 r5:85583c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7edfb0 to 0xeb7edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500cb80 INFO: task kworker/1:900:5238 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:901:5239 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:901 state:D stack:0 pid:5239 tgid:5239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb781d84 r8:00000002 r7:60000113 r6:eb781d8c r5:85584800 r4:85584800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85584800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb781e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500cd40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85584800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb603000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555938c r4:85559000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555938c r4:84dab080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85584800 r8:84dab0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dab080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dab080 r8:8027ecf4 r7:eb7ede60 r6:84dab100 r5:85584800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb781fb0 to 0xeb781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500cb80 INFO: task kworker/1:901:5239 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:902:5241 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:902 state:D stack:0 pid:5241 tgid:5241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7fdd84 r8:00000002 r7:60000013 r6:eb7fdd8c r5:85585400 r4:85585400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85585400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7fde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfaf80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85585400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb65f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85559b8c r4:85559800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85559b8c r4:84dab180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85585400 r8:84dab1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dab180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dab180 r8:8027ecf4 r7:eb7ede60 r6:84dab200 r5:85585400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7fdfb0 to 0xeb7fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84dfafc0 INFO: task kworker/1:902:5241 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:903:5243 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:903 state:D stack:0 pid:5243 tgid:5243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb801d84 r8:00000002 r7:60000113 r6:eb801d8c r5:85586c00 r4:85586c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85586c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb801e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84573780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85586c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac0f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555ab8c r4:8555a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555ab8c r4:84dab280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85586c00 r8:84dab2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dab280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dab280 r8:8027ecf4 r7:eb7fde60 r6:84dab300 r5:85586c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb801fb0 to 0xeb801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500c380 INFO: task kworker/1:903:5243 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:904:5244 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:904 state:D stack:0 pid:5244 tgid:5244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb809d84 r8:00000002 r7:60000013 r6:eb809d8c r5:85581800 r4:85581800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85581800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb809e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84573140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85581800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb669000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85559f8c r4:85559c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85559f8c r4:84dab380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85581800 r8:84dab3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dab380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dab380 r8:8027ecf4 r7:eb801e60 r6:84dab400 r5:85581800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb809fb0 to 0xeb809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8500c380 INFO: task kworker/1:904:5244 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:905:5246 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:905 state:D stack:0 pid:5246 tgid:5246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb80dd84 r8:00000002 r7:60000013 r6:eb80dd8c r5:85586000 r4:85586000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85586000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb80de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845732c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85586000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb68b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555a38c r4:8555a000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555a38c r4:84dab500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85586000 r8:84dab52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dab500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dab500 r8:8027ecf4 r7:eb801e60 r6:84dab480 r5:85586000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb80dfb0 to 0xeb80dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845733c0 INFO: task kworker/1:905:5246 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:906:5248 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:906 state:D stack:0 pid:5248 tgid:5248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb811d84 r8:00000002 r7:60000013 r6:eb811d8c r5:85580000 r5:85580000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb811e08 r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8555a78c r4:84dab580 r10:00000000 r9:84dab580 r8:8027ecf4 r7:eb801e60 r6:84dab600 r5:85580000 Exception stack(0xeb811fb0 to 0xeb811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84573280 INFO: task kworker/1:906:5248 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:907:5253 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:907 state:D stack:0 pid:5253 tgid:5253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb815d84 r8:00000002 r7:60000113 r6:eb815d8c r5:8557d400 r4:8557d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8557d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb815e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84573980 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8557d400 r8:84dab6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:908:5254 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:908 state:D stack:0 pid:5254 tgid:5254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb819d84 r8:00000002 r7:60000013 r6:eb819d8c r5:854ae000 r5:854ae000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8555af8c r4:84dab780 r4:84dab780 Exception stack(0xeb819fb0 to 0xeb819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84573880 INFO: task kworker/1:908:5254 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:909:5257 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:909 state:D stack:0 pid:5257 tgid:5257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb821d84 r8:00000002 r7:60000113 r6:eb821d8c r5:855b0000 r4:855b0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb821e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:855b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:855b0000 r8:84dab8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb821fb0 to 0xeb821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845739c0 INFO: task kworker/1:909:5257 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:910:5258 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:910 state:D stack:0 pid:5258 tgid:5258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb805d84 r8:00000002 r7:60000013 r6:eb805d8c r5:855b0c00 r4:855b0c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b0c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb805e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84573b80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555b78c r4:8555b400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555b78c r4:84dab980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b0c00 r8:84dab9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dab980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dab980 r8:8027ecf4 r7:eb821e60 r6:84daba00 r5:855b0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb805fb0 to 0xeb805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845739c0 INFO: task kworker/1:910:5258 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:911:5260 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:911 state:D stack:0 pid:5260 tgid:5260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb825d84 r8:00000002 r7:60000113 r6:eb825d8c r5:855b1800 r4:855b1800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb825e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84573f00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2cf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555bf8c r4:8555bc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555bf8c r4:84daba80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b1800 r8:84dabaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84daba80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84daba80 r8:8027ecf4 r7:eb821e60 r6:84dabb00 r5:855b1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb825fb0 to 0xeb825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84573d40 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:e06cddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:912:5261 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:912 state:D stack:0 pid:5261 tgid:5261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb82dd84 r8:00000002 r7:60000113 r6:eb82dd8c r5:855b2400 r4:855b2400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb82de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84564040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb31b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556438c r4:85564000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556438c r4:84dabb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b2400 r8:84dabbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dabb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dabb80 r8:8027ecf4 r7:eb825e60 r6:84dabc00 r5:855b2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb82dfb0 to 0xeb82dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84573d40 INFO: task kworker/1:912:5261 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:913:5264 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:913 state:D stack:0 pid:5264 tgid:5264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb831d84 r8:00000002 r7:60000113 r6:eb831d8c r5:84e71800 r4:84e71800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e71800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb831e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84564180 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e71800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb341000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556478c r4:85564400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556478c r4:84dabc80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e71800 r8:84dabcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dabc80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dabc80 r8:8027ecf4 r7:eb82de60 r6:84ffc780 r5:84e71800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb831fb0 to 0xeb831ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84564080 INFO: task kworker/1:913:5264 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eb83dd84 r8:00000002 r7:60000013 r6:eb83dd8c r5:84e75400 r5:84e75400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb83de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84564240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e75400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb369000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85564b8c r4:85564800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85564b8c r4:84dabd00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e75400 r8:84dabd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dabd00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dabd00 r8:8027ecf4 r7:eb831e60 r6:84ffc800 r5:84e75400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb83dfb0 to 0xeb83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845642c0 INFO: task kworker/1:914:5267 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:915:5269 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:915 state:D stack:0 pid:5269 tgid:5269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb845d84 r8:00000002 r7:60000113 r6:eb845d8c r5:84e74800 r4:84e74800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e74800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb845e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb3c7000 r10:61c88647 r9:84e74800 r8:84dabdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 INFO: task kworker/1:916:5270 blocked for more than 464 seconds. r5:84e76000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb849fb0 to 0xeb849ff8) r4:84564280 INFO: task kworker/1:916:5270 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eb851d84 r8:00000002 r7:60000013 r6:eb851d8c r5:84e73c00 r5:84e73c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85565f8c r4:85565c00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:918:5274 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:918 state:D stack:0 pid:5274 tgid:5274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:84e76c00 r5:84e76c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe06cdd20 to 0xe06cdd68) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:919:5276 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:919 state:D stack:0 pid:5276 tgid:5276 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb829d84 r8:00000002 r7:60000013 r6:eb829d8c r5:855b3c00 r4:855b3c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb829e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84564800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85565b8c r4:85565800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85565b8c r4:84dabf80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b3c00 r8:84dabfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84dabf80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dabf80 r8:8027ecf4 r7:eb851e60 r6:845b0000 r5:855b3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb829fb0 to 0xeb829ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84564600 INFO: task kworker/1:919:5276 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:920:5279 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:920 state:D stack:0 pid:5279 tgid:5279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb85dd84 r8:00000002 r7:60000113 r6:eb85dd8c r5:855b4800 r4:855b4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb85de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500c380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb583000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85566f8c r4:85566c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85566f8c r4:845b0080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b4800 r8:845b00ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845b0080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845b0080 r8:8027ecf4 r7:eb851e60 r6:845b0100 r5:855b4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb85dfb0 to 0xeb85dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84564900 INFO: task kworker/1:920:5279 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:921:5280 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:921 state:D stack:0 pid:5280 tgid:5280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb835d84 r8:00000002 r7:60000113 r6:eb835d8c r5:855b5400 r4:855b5400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb835e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84564a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb51f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556638c r4:85566000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556638c r4:845b0180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b5400 r8:845b01ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845b0180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845b0180 r8:8027ecf4 r7:eb85de60 r6:845b0200 r5:855b5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb835fb0 to 0xeb835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84564900 INFO: task kworker/1:921:5280 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:922:5282 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:922 state:D stack:0 pid:5282 tgid:5282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb865d84 r8:00000002 r7:60000013 r6:eb865d8c r5:855b6000 r4:855b6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb865e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84564cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb53d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556678c r4:85566400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556678c r4:845b0280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b6000 r8:845b02ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845b0280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845b0280 r8:8027ecf4 r7:eb85de60 r6:845b0300 r5:855b6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb865fb0 to 0xeb865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84564a40 INFO: task kworker/1:922:5282 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:923:5285 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:923 state:D stack:0 pid:5285 tgid:5285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb86dd84 r8:00000002 r7:60000013 r6:eb86dd8c r5:855b3000 r4:855b3000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb86de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84564d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb55b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85566b8c r4:85566800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85566b8c r4:845b0380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b3000 r8:845b03ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845b0380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845b0380 r8:8027ecf4 r7:eb85de60 r6:845b0400 r5:855b3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb86dfb0 to 0xeb86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84564dc0 Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:855ac800 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018005 r8:855ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:855ac800 r8:84ffcaac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84ffca80 r8:8027ecf4 r7:dfaa5e60 r6:84ffcb00 r5:855ac800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb871fb0 to 0xeb871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84589fc0 INFO: task kworker/0:149:5287 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:924:5288 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:924 state:D stack:0 pid:5288 tgid:5288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb875d84 r8:00000002 r7:60000113 r6:eb875d8c r5:855aec00 r4:855aec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855aec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb875e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542c700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6e1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85567f8c r4:85567c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85567f8c r4:845b0480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855aec00 r8:845b04ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845b0480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845b0480 r8:8027ecf4 r7:eb85de60 r6:84ffcb80 r5:855aec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb875fb0 to 0xeb875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84564f80 INFO: task kworker/1:924:5288 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:925:5289 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:925 state:D stack:0 pid:5289 tgid:5289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb879d84 r8:00000002 r7:60000013 r6:eb879d8c r5:855ae000 r4:855ae000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ae000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb879e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542c000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556738c r4:85567000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556738c r4:845b0500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ae000 r8:845b052c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845b0500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845b0500 r8:8027ecf4 r7:eb875e60 r6:84ffcc00 r5:855ae000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb879fb0 to 0xeb879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84573d40 INFO: task kworker/1:925:5289 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:926:5292 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:926 state:D stack:0 pid:5292 tgid:5292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb87dd84 r8:00000002 r7:60000113 r6:eb87dd8c r5:84e72400 r4:84e72400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e72400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb87de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542c1c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e72400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556778c r4:85567400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556778c r4:845b0580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e72400 r8:845b05ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845b0580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845b0580 r8:8027ecf4 r7:eb875e60 r6:84ffcc80 r5:84e72400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb87dfb0 to 0xeb87dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8542c180 INFO: task kworker/1:926:5292 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8117d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:927:5293 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:927 state:D stack:0 pid:5293 tgid:5293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb869d84 r8:00000002 r7:60000013 r6:eb869d8c r5:84e73000 r4:84e73000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e73000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb869e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542c640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e73000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85567b8c r4:85567800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85567b8c r4:845b0600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e73000 r8:845b062c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845b0600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845b0600 r8:8027ecf4 r7:eb875e60 r6:84ffcd00 r5:84e73000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb869fb0 to 0xeb869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8542c340 INFO: task kworker/1:927:5293 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8169e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:150:5295 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:150 state:D stack:0 pid:5295 tgid:5295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb881d84 r8:00000002 r7:60000113 r6:eb881d8c r5:84c40000 r4:84c40000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c40000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb881e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523d1c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c40000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d6f8c r4:854d6c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d6f8c r4:84ffcd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c40000 r8:84ffcdac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ffcd80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ffcd80 r8:8027ecf4 r7:dfaa5e60 r6:84ffce00 r5:84c40000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb881fb0 to 0xeb881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84589d80 INFO: task kworker/0:150:5295 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8169e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:151:5297 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:151 state:D stack:0 pid:5297 tgid:5297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb885d84 r8:00000002 r7:60000113 r6:eb885d8c r5:84c40c00 r4:84c40c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c40c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb885e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523d000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c40c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: 8169e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84ff7f8c r4:84ff7c00 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84c41800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:153:5302 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:153 state:D stack:0 pid:5302 tgid:5302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb891d84 r8:00000002 r7:60000113 r6:eb891d8c r5:84c42400 r4:84c42400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c42400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb891e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85255300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c42400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb693000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d778c r4:854d7400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d778c r4:8524a000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c42400 r8:8524a02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8524a000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a000 r8:8027ecf4 r7:eb889e60 r6:8524a080 r5:84c42400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb891fb0 to 0xeb891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8523d180 INFO: task kworker/0:153:5302 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8169e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:928:5304 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:928 state:D stack:0 pid:5304 tgid:5304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb895d84 r8:00000002 r7:60000013 r6:eb895d8c r5:84c43000 r4:84c43000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c43000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542c880 r9:83018205 r8:84c43000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r10:61c88647 r9:84c43000 r8:845b06ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:929:5306 blocked for more than 464 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb89dd84 r8:00000002 r7:60000113 r6:eb89dd8c r5:84c44800 r4:84c44800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c44800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb89de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542cd40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c44800 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556938c r4:85569000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556938c r4:845b0700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c44800 r8:845b072c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845b0700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845b0700 r8:8027ecf4 r7:eb895e60 r6:8524a180 r5:84c44800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb89dfb0 to 0xeb89dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8542c800 INFO: task kworker/1:929:5306 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8169e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 INFO: task kworker/1:930:5308 blocked for more than 464 seconds. r5:84c43c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eb88dd84 r8:00000002 r7:60000113 r6:eb88dd8c r5:85588c00 r5:85588c00 r4:829189bc [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8542c900 INFO: task kworker/1:931:5309 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8169e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:932:5313 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:932 state:D stack:0 pid:5313 tgid:5313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb8a9d84 r8:00000002 r7:60000113 r6:eb8a9d8c r5:85589800 r4:85589800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85589800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542cc80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85589800 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa71000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85568f8c r4:85568c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85568f8c r4:845b0900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85589800 r8:845b092c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845b0900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845b0900 r8:8027ecf4 r7:eb89de60 r6:845b0980 r5:85589800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a9fb0 to 0xeb8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:800f0113 r4:80239bb0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/1:933:5315 blocked for more than 464 seconds. r5:8558a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8556978c r4:85569400 r4:845b0a00 dfa0: 00000000 00000000 00000000 00000000 Call trace: dd20: 8169e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:934:5317 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:934 state:D stack:0 pid:5317 tgid:5317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7add84 r8:00000002 r7:60000013 r6:eb7add8c r5:8558b000 r4:8558b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8558b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ade08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854232c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8558b000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf13000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556a78c r4:8556a400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556a78c r4:845b0b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558b000 r8:845b0b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845b0b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845b0b00 r8:8027ecf4 r7:eb8ade60 r6:845b0b80 r5:8558b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7adfb0 to 0xeb7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8542cf40 INFO: task kworker/1:934:5317 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8169e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:935:5319 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:935 state:D stack:0 pid:5319 tgid:5319 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb8b5d84 r8:00000002 r7:60000013 r6:eb8b5d8c r5:8558bc00 r5:8558bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:936:5320 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:936 state:D stack:0 pid:5320 tgid:5320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb899d84 r8:00000002 r7:60000113 r6:eb899d8c r5:8558c800 r4:8558c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8558c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb899e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85423000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8558c800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac77000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85569f8c r4:85569c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85569f8c r4:845b0d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558c800 r8:845b0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845b0d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845b0d00 r8:8027ecf4 r7:eb7ade60 r6:845b0d80 r5:8558c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb899fb0 to 0xeb899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85423100 INFO: task kworker/1:936:5320 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8169e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r4:8501e100 task:kworker/1:937 state:D stack:0 pid:5322 tgid:5322 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb8b9d84 r8:00000002 r7:60000113 r6:eb8b9d8c r5:8558d400 r4:8558d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8558d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85423200 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8558d400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead35000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556a38c r4:8556a000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556a38c r4:845b0e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558d400 r8:845b0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845b0e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845b0e00 r8:8027ecf4 r7:eb7ade60 r6:845b0e80 r5:8558d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b9fb0 to 0xeb8b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:938:5324 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:938 state:D stack:0 pid:5324 tgid:5324 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb8bdd84 r8:00000002 r7:60000013 r6:eb8bdd8c r5:8558e000 r4:8558e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8558e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8bde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85423540 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8558e000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8169e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85588000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8524e000 r8:8027ecf4 r7:eb8bde60 r6:8524e080 r5:85588000 r4:85423640 Call trace: r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8169e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:940:5327 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:940 state:D stack:0 pid:5327 tgid:5327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb8c1d84 r8:00000002 r7:60000113 r6:eb8c1d8c r5:85590000 r4:85590000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85590000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85423a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85590000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb229000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556bb8c r4:8556b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556bb8c r4:8524e100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85590000 r8:8524e12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8524e100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524e100 r8:8027ecf4 r7:eb8c5e60 r6:8524e180 r5:85590000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c1fb0 to 0xeb8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:941 state:D stack:0 pid:5329 tgid:5329 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:855c0c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8cde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854239c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb095000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556b38c r4:8556b000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556b38c r4:8524e200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c0c00 r8:8524e22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8524e200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524e200 r8:8027ecf4 r7:eb8c1e60 r6:8524a280 r5:855c0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8cdfb0 to 0xeb8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85423980 INFO: task kworker/1:941:5329 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8169e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: r5:855c3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb1ff000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:855c0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8524e300 Exception stack(0xeb8e1fb0 to 0xeb8e1ff8) r4:85423c80 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:944:5337 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:944 state:D stack:0 pid:5337 tgid:5337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb8e5d84 r8:00000002 r7:60000013 r6:eb8e5d8c r5:855c4800 r4:855c4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85423e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb24f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556bf8c r4:8556bc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8556bf8c r4:8524e380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c4800 r8:8524e3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8524e380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524e380 r8:8027ecf4 r7:eb8e1e60 r6:8524a400 r5:855c4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e5fb0 to 0xeb8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85423c80 INFO: task kworker/1:944:5337 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8169e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:945:5338 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:945 state:D stack:0 pid:5338 tgid:5338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb8d1d84 r8:00000002 r7:60000113 r6:eb8d1d8c r5:85590c00 r4:85590c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85590c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85423f00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85590c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb281000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524438c r4:85244000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524438c r4:8524e400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85590c00 r8:8524e42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8524e400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524e400 r8:8027ecf4 r7:eb8e1e60 r6:8524e480 r5:85590c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d1fb0 to 0xeb8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85423d80 INFO: task kworker/1:945:5338 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84ff7f8c r4:84ff7c00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 INFO: task kworker/1:946:5341 blocked for more than 464 seconds. r5:85592400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd20: 8169e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:947:5344 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:947 state:D stack:0 pid:5344 tgid:5344 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb8f9d84 r8:00000002 r7:60000113 r6:eb8f9d8c r5:855c5400 r4:855c5400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: 8169e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:84ff7f8c r4:84ff7c00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 INFO: task kworker/1:948:5346 blocked for more than 464 seconds. r5:855c3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb8edd84 r8:00000002 r7:60000013 r6:eb8edd8c r5:85593000 r4:85593000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85593000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ede08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84541ac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85593000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb67b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85245f8c r4:85245c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85245f8c r4:8524e700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85593000 r8:8524e72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8524e700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524e700 r8:8027ecf4 r7:eb901e60 r6:8524e780 r5:85593000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8edfb0 to 0xeb8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84541680 INFO: task kworker/1:949:5347 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8169e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:950:5349 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:950 state:D stack:0 pid:5349 tgid:5349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb8fdd84 r8:00000002 r7:60000113 r6:eb8fdd8c r5:85594800 r4:85594800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85594800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8fde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84541540 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85594800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb605000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524578c r4:85245400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524578c r4:8524e800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85594800 r8:8524e82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8524e800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524e800 r8:8027ecf4 r7:eb8ede60 r6:8524e880 r5:85594800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8fdfb0 to 0xeb8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845414c0 INFO: task kworker/1:950:5349 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8169e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:951:5351 blocked for more than 465 seconds. Call trace: r5:85596000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb905e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85245b8c r4:85245800 r4:8524e900 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:952:5352 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:952 state:D stack:0 pid:5352 tgid:5352 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb909d84 r8:00000002 r7:60000113 r6:eb909d8c r5:85593c00 r4:85593c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85593c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb909e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845af140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85593c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7dd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85246f8c r4:85246c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85246f8c r4:8524ea00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85593c00 r8:8524ea2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8524ea00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524ea00 r8:8027ecf4 r7:eb8ede60 r6:8524ea80 r5:85593c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb909fb0 to 0xeb909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84541740 INFO: task kworker/1:952:5352 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe06cdd20 to 0xe06cdd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:953:5355 blocked for more than 465 seconds. Workqueue: events bpf_prog_free_deferred r4:85596c00 r5:85596c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84541d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85596c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb771000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524638c r4:85246000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524638c r4:8524eb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85596c00 r8:8524eb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8524eb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524eb00 r8:8027ecf4 r7:eb909e60 r6:8524eb80 r5:85596c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb911fb0 to 0xeb911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845415c0 INFO: task kworker/1:953:5355 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8169e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85595400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb915e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8524ec00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) Not tainted 6.15.0-syzkaller #0 r5:85591800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852401c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85591800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae6d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f038c r4:854f0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854f038c r4:8524a580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85591800 r8:8524a5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8524a580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a580 r8:8027ecf4 r7:eb889e60 r6:8524ed00 r5:85591800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb91dfb0 to 0xeb91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85255540 INFO: task kworker/0:154:5360 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:155:5361 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 Call trace: r5:855c2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85255e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb961000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d7f8c r4:854d7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854d7f8c r4:8524a600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c2400 r8:8524a62c r7:82804d40 r6:dddced40 r5:dddced60 r4:8524a600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a600 r8:8027ecf4 r7:eb91de60 r6:8524a680 r5:855c2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c9fb0 to 0xeb8c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85255540 INFO: task kworker/0:155:5361 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:8501e100 Workqueue: events bpf_prog_free_deferred r5:855c6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb7d3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8524ed80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) dd60: 800f0113 ffffffff [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r4:00000001 r4:8501e100 task:kworker/1:956 state:D stack:0 pid:5365 tgid:5365 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8558ec00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb92de08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb92dfb0 to 0xeb92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845af100 INFO: task kworker/1:956:5365 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:957:5367 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:957 state:D stack:0 pid:5367 tgid:5367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb935d84 r8:00000002 r7:60000013 r6:eb935d8c r5:84c46c00 r4:84c46c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c46c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb935e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845af200 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c46c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7f7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524738c r4:85247000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524738c r4:8524ee80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c46c00 r8:8524eeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8524ee80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524ee80 r8:8027ecf4 r7:eb92de60 r6:8524a800 r5:84c46c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb935fb0 to 0xeb935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845af3c0 INFO: task kworker/1:957:5367 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:958:5368 blocked for more than 465 seconds. Workqueue: events bpf_prog_free_deferred r5:84c46000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb93de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845af600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c46000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb949000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85247f8c r4:85247c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85247f8c r4:8524ef00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c46000 r8:8524ef2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8524ef00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524ef00 r8:8027ecf4 r7:eb92de60 r6:8524a880 r5:84c46000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb93dfb0 to 0xeb93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845af4c0 INFO: task kworker/1:958:5368 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829189c0 r9:eb94dd84 r8:00000002 r7:60000013 r6:eb94dd8c r5:855c1800 r5:855c1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8524ef80 r8:8027ecf4 r7:eb93de60 r6:8524a900 r5:855c1800 r4:845af680 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84ff7f8c r4:84ff7c00 r4:85004e00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:960:5372 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:960 state:D stack:0 pid:5372 tgid:5372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb955d84 r8:00000002 r7:60000113 r6:eb955d8c r5:84c45400 r4:84c45400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c45400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb955e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84575040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c45400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:855d978c r4:8524d000 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: r5:84c48000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb965e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845af800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c48000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb95b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855d838c r4:855d8000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855d838c r4:8524d080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c48000 r8:8524d0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8524d080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524d080 r8:8027ecf4 r7:eb955e60 r6:8524aa00 r5:84c48000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb965fb0 to 0xeb965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845af880 INFO: task kworker/1:961:5375 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:156:5379 blocked for more than 465 seconds. Call trace: r5:84c49800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84c07f8c r4:84c07c00 r7:dddced40 r6:83018000 r5:84c07f8c r4:8524aa80 r10:00000000 r9:8524aa80 r8:8027ecf4 r7:eb91de60 r6:8524ab00 r5:84c49800 INFO: task kworker/0:156:5379 is blocked on a mutex likely owned by task kworker/1:290:3848. dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:157:5380 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:157 state:D stack:0 pid:5380 tgid:5380 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb919d84 r8:00000002 r7:60000113 r6:eb919d8c r5:84c4a400 r4:84c4a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c4a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb919e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85240040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c4a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadeb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c07b8c r4:84c07800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c07b8c r4:8524ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c4a400 r8:8524abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8524ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524ab80 r8:8027ecf4 r7:eb91de60 r6:8524ac00 r5:84c4a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb919fb0 to 0xeb919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85255a00 INFO: task kworker/0:157:5380 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:158:5383 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:158 state:D stack:0 pid:5383 tgid:5383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb951d84 r8:00000002 r7:60000113 r6:eb951d8c r5:84c48c00 r4:84c48c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c48c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb951e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85240280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84c48c00 r8:8524acac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r4:855b6c00 r5:855b6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85002380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5cf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855d878c r4:855d8400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855d878c r4:8524d100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b6c00 r8:8524d12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8524d100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524d100 r8:8027ecf4 r7:eb955e60 r6:8524d180 r5:855b6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb971fb0 to 0xeb971ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 Not tainted 6.15.0-syzkaller #0 r5:85598c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85599800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:161:5390 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:161 state:D stack:0 pid:5390 tgid:5390 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb989d84 r8:00000002 r7:60000113 r6:eb989d8c r5:8559a400 r4:8559a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8559a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb989e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85240580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8559a400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb309000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f0f8c r4:854f0c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854f0f8c r4:8524ae80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8524ae80 9fa0: 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) Not tainted 6.15.0-syzkaller #0 r5:8559b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:163:5394 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:163 state:D stack:0 pid:5394 tgid:5394 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb999d84 r8:00000002 r7:60000113 r6:eb999d8c r5:8559d400 r4:8559d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8559d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb999e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85240d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8559d400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r5:854f278c r4:854f2400 r4:8524af80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8559bc00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8559bc00 r8:845a602c r7:82804d40 r6:dddced40 r5:dddced60 dfa0: 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:165:5396 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:165 state:D stack:0 pid:5396 tgid:5396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb9a1d84 r8:00000002 r7:60000113 r6:eb9a1d8c r5:8559e000 r4:8559e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8559e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85240b40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8559e000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f1f8c r4:854f1c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854f1f8c r4:845a6080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559e000 r8:845a60ac r7:82804d40 r6:dddced40 r5:dddced60 r4:845a6080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845a6080 r8:8027ecf4 r7:eb999e60 r6:8524d500 r5:8559e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a1fb0 to 0xeb9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852408c0 INFO: task kworker/0:165:5396 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:8559c800 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8559ec00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:845a6180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845a6180 r8:8027ecf4 r7:eb999e60 r6:8524d600 r5:8559ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b5fb0 to 0xeb9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85240bc0 INFO: task kworker/0:167:5402 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:168:5403 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:168 state:D stack:0 pid:5403 tgid:5403 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb9b9d84 r8:00000002 r7:60000013 r6:eb9b9d8c r5:85598000 r4:85598000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85598000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85240f00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85598000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb55d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f2b8c r4:854f2800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854f2b8c r4:845a6200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85598000 r8:845a622c r7:82804d40 r6:dddced40 r5:dddced60 r4:845a6200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845a6200 r8:8027ecf4 r7:eb9b5e60 r6:8524d680 r5:85598000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b9fb0 to 0xeb9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85240d40 INFO: task kworker/0:168:5403 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:84ff7f8c r4:84ff7c00 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:855a0c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84541f80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb599000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f2f8c r4:854f2c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854f2f8c r4:845a6280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a0c00 r8:845a62ac r7:82804d40 r6:dddced40 r5:dddced60 r4:845a6280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845a6280 r8:8027ecf4 r7:eb9b5e60 r6:8524d700 r5:855a0c00 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:82ac11e4 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:855a1800 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fa0: 00000000 00000000 00000000 00000000 dd60: 800f0113 ffffffff r4:00000000 r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:963:5409 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:963 state:D stack:0 pid:5409 tgid:5409 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb995d84 r8:00000002 r7:60000113 r6:eb995d8c r5:855a2400 r4:855a2400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb995e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85002780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb713000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855d8b8c r4:855d8800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855d8b8c r4:8524d800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a2400 r8:8524d82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8524d800 5fa0: 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Not tainted 6.15.0-syzkaller #0 r5:855a3000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r5:854f378c r4:854f3400 9fa0: 00000000 00000000 00000000 00000000 dd60: 800f0113 ffffffff r4:00000000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r4:8501e100 r5:855a4800 r4:829189bc r4:00000000 r5:854f3f8c r4:854f3c00 1fa0: 00000000 00000000 00000000 00000000 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:173:5416 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:173 state:D stack:0 pid:5416 tgid:5416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb9b1d84 r8:00000002 r7:60000013 r6:eb9b1d8c r5:855a5400 r4:855a5400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b1e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:dfd83000 r4:85004e00 r4:8501e100 r4:855a6000 r5:855a6000 r4:829189bc [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85002740 INFO: task kworker/1:964:5418 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:855a6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/0:175 state:D stack:0 pid:5421 tgid:5421 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85640b8c r4:85640800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85640b8c r4:845a6580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a3c00 r8:845a65ac r7:82804d40 r6:dddced40 r5:dddced60 r4:845a6580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845a6580 r8:8027ecf4 r7:eb9d9e60 r6:8524dc00 r5:855a3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9ddfb0 to 0xeb9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8542d5c0 INFO: task kworker/0:175:5421 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:85004e00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85608000 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8542d800 INFO: task kworker/0:176:5424 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:84c4e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:00000000 r9:845a6680 r8:8027ecf4 r7:eb9e9e60 r6:845a6700 r5:84c4e000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:178:5428 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:178 state:D stack:0 pid:5428 tgid:5428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb9e5d84 r8:00000002 r7:60000013 r6:eb9e5d8c r5:84c4ec00 r4:84c4ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c4ec00 r4:829189bc r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8542d900 dd60: 800f0113 ffffffff [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) INFO: task kworker/0:179:5429 blocked for more than 465 seconds. r5:84c4c800 r4:829189bc [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84c4d400 r4:829189bc r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e07940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba13000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564238c r4:85642000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564238c r4:845a6980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c4d400 r8:845a69ac r7:82804d40 r6:dddced40 r5:dddced60 r4:845a6980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845a6980 r8:8027ecf4 r7:eb9e9e60 r6:845a6a00 r5:84c4d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9fdfb0 to 0xeb9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8501e100 r5:84c4bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba09e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:e06cddc0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/0:182:5436 blocked for more than 465 seconds. r5:84c4b000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb975e08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8542d480 INFO: task kworker/0:182:5436 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 Exception stack(0xe06cdfb0 to 0xe06cdff8) r4:855d0000 r5:855d0000 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 task:kworker/0:184 state:D stack:0 pid:5441 tgid:5441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eba1dd84 r8:00000002 r7:60000013 r6:eba1dd8c r5:855d0c00 r4:855d0c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855d0c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba1de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8459e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba31000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85642f8c r4:85642c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85642f8c r4:845a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d0c00 r8:845a6dac r7:82804d40 r6:dddced40 r5:dddced60 r4:845a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845a6d80 r8:8027ecf4 r7:eba21e60 r6:845a6e00 r5:855d0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba1dfb0 to 0xeba1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8459e640 INFO: task kworker/0:184:5441 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:855d2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:845a6e80 r8:8027ecf4 r7:eba1de60 r6:845a6f00 r5:855d2400 INFO: task kworker/0:185:5443 is blocked on a mutex likely owned by task kworker/1:290:3848. dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:855d3000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:845a6f80 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:187:5446 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:187 state:D stack:0 pid:5446 tgid:5446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb8f1d84 r8:00000002 r7:60000013 r6:eb8f1d8c r5:855d3c00 r4:855d3c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855d3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8459e680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa85000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r5:84ff7f8c r4:84ff7c00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:855d1800 r5:855d1800 r4:829189bc [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8457f180 r8:8027ecf4 r7:eba29e60 r6:8457f200 r5:855d1800 INFO: task kworker/0:188:5448 is blocked on a mutex likely owned by task kworker/1:290:3848. dd60: 800f0113 ffffffff r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:965:5451 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:965 state:D stack:0 pid:5451 tgid:5451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eba49d84 r8:00000002 r7:60000113 r6:eba49d8c r5:85609800 r4:85609800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85609800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba49e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85229880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85609800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbbb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855da38c r4:855da000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855da38c r4:8524dd00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85609800 r8:8524dd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8524dd00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524dd00 r8:8027ecf4 r7:eb955e60 r6:8524dd80 r5:85609800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba49fb0 to 0xeba49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84575080 INFO: task kworker/1:965:5451 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 INFO: task kworker/1:966:5452 blocked for more than 465 seconds. r5:8560a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:189:5454 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:189 state:D stack:0 pid:5454 tgid:5454 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eba61d84 r8:00000002 r7:60000113 r6:eba61d8c r5:8560bc00 r4:8560bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8560bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba61e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8459eec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8560bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb055000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564838c r4:85648000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564838c r4:8457f280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8560bc00 r8:8457f2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8457f280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8457f280 r8:8027ecf4 r7:eba51e60 r6:8524df00 r5:8560bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba61fb0 to 0xeba61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8459ed40 INFO: task kworker/0:189:5454 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8501e100 Workqueue: events bpf_prog_free_deferred r5:8560c800 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba69e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8457f300 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85608c00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84583040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85608c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb209000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85648b8c r4:85648800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85648b8c r4:8457f380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85608c00 r8:8457f3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8457f380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8457f380 r8:8027ecf4 r7:eba51e60 r6:84db1000 r5:85608c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba71fb0 to 0xeba71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8459ef40 INFO: task kworker/0:191:5459 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:192 state:D stack:0 pid:5460 tgid:5460 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8560e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:193:5463 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:193 state:D stack:0 pid:5463 tgid:5463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eba81d84 r8:00000002 r7:60000013 r6:eba81d8c r5:8560ec00 r4:8560ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8560ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba81e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/0:194 state:D stack:0 pid:5465 tgid:5465 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8560b000 r4:829189bc [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:8560b000 r8:8457f52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8457f500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8457f500 r8:8027ecf4 r7:eba81e60 r6:84db1180 r5:8560b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba89fb0 to 0xeba89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:195:5467 blocked for more than 465 seconds. r5:855a0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd20: 81bcc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:967:5469 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:967 state:D stack:0 pid:5469 tgid:5469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eba99d84 r8:00000002 r7:60000113 r6:eba99d8c r5:84e10000 r4:84e10000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e10000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba99e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85229780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e10000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 r5:00001000 r4:ebbad000 r10:00000000 r9:84db1280 r8:8027ecf4 r7:eba49e60 r6:84db1300 r5:84e10000 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84e10c00 r4:829189bc [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84e12400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84583740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e12400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb661000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564a38c r4:8564a000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564a38c r4:8457f680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:8457f6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8457f680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8457f680 r8:8027ecf4 r7:eba89e60 r6:84db1400 r5:84e12400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa5fb0 to 0xebaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84583640 INFO: task kworker/0:197:5472 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8823e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:84e11800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8459ef40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e13000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564bb8c r4:8564b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564bb8c r4:8457f780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e13000 r8:8457f7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8457f780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8457f780 r8:8027ecf4 r7:eba89e60 r6:84db1500 r5:84e13000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab9fb0 to 0xebab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845838c0 INFO: task kworker/0:199:5477 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8856a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e15400 r5:84e15400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac1e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8564af8c r4:8564ac00 r10:61c88647 r9:84e15400 r8:8457f82c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebac5d84 r8:00000002 r7:60000013 r6:ebac5d8c r5:84e14800 r4:84e14800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e14800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84583d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e14800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564b38c r4:8564b000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564b38c r4:8457f880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e14800 r8:8457f8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8457f880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8457f880 r8:8027ecf4 r7:ebab9e60 r6:84db1600 r5:84e14800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebac5fb0 to 0xebac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84583780 INFO: task kworker/0:201:5480 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 88a3a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:202:5482 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:202 state:D stack:0 pid:5482 tgid:5482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebacdd84 r8:00000002 r7:60000013 r6:ebacdd8c r5:84e16c00 r4:84e16c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e16c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebacde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8457f900 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 r5:84ff7f8c r4:84ff7c00 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84e16000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018005 r8:84e16000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 r7:dddced40 r6:83018000 r5:8564cb8c r4:8457f980 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:204:5486 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:204 state:D stack:0 pid:5486 tgid:5486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebad9d84 r8:00000002 r7:60000113 r6:ebad9d8c r5:84e13c00 r4:84e13c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e13c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85520000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564bf8c r4:8564bc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564bf8c r4:8457fa00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e13c00 r8:8457fa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8457fa00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8457fa00 r8:8027ecf4 r7:ebad5e60 r6:84db1780 r5:84e13c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad9fb0 to 0xebad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855200c0 INFO: task kworker/0:204:5486 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 88ed4000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:855c6000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae1e08 r9:83018005 r8:855c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 r10:61c88647 r9:855c6000 r8:8457faac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:206:5490 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:206 state:D stack:0 pid:5490 tgid:5490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebae9d84 r8:00000002 r7:60000113 r6:ebae9d8c r5:85610c00 r4:85610c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85610c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85520300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85610c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb923000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564c78c r4:8564c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564c78c r4:8457fb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85610c00 r8:8457fb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8457fb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8457fb00 r8:8027ecf4 r7:ebad5e60 r6:84db1880 r5:85610c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae9fb0 to 0xebae9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebaf5d84 r8:00000002 r7:60000113 r6:ebaf5d8c r5:85610000 r4:85610000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85610000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85520780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85610000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb959000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564d78c r4:8564d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564d78c r4:8457fb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85610000 r8:8457fbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8457fb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8457fb80 r8:8027ecf4 r7:ebad5e60 r6:84db1900 r5:85610000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf5fb0 to 0xebaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85520240 INFO: task kworker/0:207:5493 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:84ff7f8c r4:84ff7c00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 Not tainted 6.15.0-syzkaller #0 r5:85613000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855205c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85613000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb939000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564cf8c r4:8564cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564cf8c r4:8457fc00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85613000 r8:8457fc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8457fc00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8457fc00 r8:8027ecf4 r7:ebaf5e60 r6:84db1980 r5:85613000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf9fb0 to 0xebaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85520240 INFO: task kworker/0:208:5494 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:82ac11e4 r4:e06cddc0 r4:00000000 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:855d5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855206c0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:855d5400 r8:8457fcac r7:82804d40 r6:dddced40 r5:dddced60 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85520500 INFO: task kworker/0:209:5496 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 89f99000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:210:5499 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:210 state:D stack:0 pid:5499 tgid:5499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:855d4800 r5:855d4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:855207c0 Workqueue: events bpf_prog_free_deferred r5:800f0113 r4:80239bb0 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:211:5500 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:211 state:D stack:0 pid:5500 tgid:5500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eba5dd84 r8:00000002 r7:60000113 r6:eba5dd8c r5:855d6c00 r4:855d6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855d6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba5de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85520b40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb0b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564df8c r4:8564dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564df8c r4:8457fe80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d6c00 r8:8457feac r7:82804d40 r6:dddced40 r5:dddced60 r4:8457fe80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:855d6000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8457ff80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85520b80 INFO: task kworker/0:212:5503 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8ae05000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:213:5505 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:213 state:D stack:0 pid:5505 tgid:5505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb15d84 r8:00000002 r7:60000013 r6:ebb15d8c r5:84c68000 r5:84c68000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb15e08 r9:83018005 r8:84c68000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 r10:61c88647 r9:84c68000 r8:8550b0ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:214:5506 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:214 state:D stack:0 pid:5506 tgid:5506 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb1dd84 r8:00000002 r7:60000113 r6:ebb1dd8c r5:84c68c00 r4:84c68c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c68c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb1de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85520e00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c68c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb1f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564e78c r4:8564e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564e78c r4:8550b180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c68c00 r8:8550b1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8550b180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550b180 r8:8027ecf4 r7:ebb15e60 r6:8550b200 r5:84c68c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb1dfb0 to 0xebb1dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r5:84ff7f8c r4:84ff7c00 r4:00000001 INFO: task kworker/0:215:5508 blocked for more than 466 seconds. r5:84c6a400 r4:829189bc [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Call trace: r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:216:5511 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:216 state:D stack:0 pid:5511 tgid:5511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84c6bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854fb040 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:85004e00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84c69800 r5:84c69800 r4:829189bc [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854fb3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c69800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564f78c r4:8564f400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564f78c r4:8550b480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c69800 r8:8550b4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8550b480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550b480 r8:8027ecf4 r7:ebb09e60 r6:8550b500 r5:84c69800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb29fb0 to 0xebb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854fb280 INFO: task kworker/0:217:5514 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84c6c800 r5:84c6c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854fb540 r7:dddced40 r6:83018000 r5:8564fb8c r4:8550b580 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:219:5517 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:219 state:D stack:0 pid:5517 tgid:5517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb9edd84 r8:00000002 r7:60000013 r6:eb9edd8c r5:84c6d400 r4:84c6d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c6d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ede08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854fb940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c6d400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2dd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565838c r4:85658000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8565838c r4:8550b680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c6d400 r8:8550b6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8550b680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550b680 r8:8027ecf4 r7:eb981e60 r6:8550b700 r5:84c6d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9edfb0 to 0xeb9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854fb480 INFO: task kworker/0:219:5517 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8c5a0000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 r5:84ff7f8c r4:84ff7c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:220:5518 blocked for more than 466 seconds. r5:84c6e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebb39fb0 to 0xebb39ff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:221:5521 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:221 state:D stack:0 pid:5521 tgid:5521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eba0dd84 r8:00000002 r7:60000013 r6:eba0dd8c r5:84c6ec00 r4:84c6ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c6ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba0de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854fbc40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb39f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85658b8c r4:85658800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85658b8c r4:8550b880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c6ec00 r8:8550b8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8550b880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550b880 r8:8027ecf4 r7:eb9ede60 r6:8550b900 r5:84c6ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba0dfb0 to 0xeba0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854fb900 INFO: task kworker/0:221:5521 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8cbfd000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:222:5522 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:222 state:D stack:0 pid:5522 tgid:5522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb3dd84 r8:00000002 r7:60000013 r6:ebb3dd8c r5:84c6b000 r4:84c6b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c6b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb3de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854fba00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c6b000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 r5:8565878c r4:85658400 r4:8550b980 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84cc8000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb41e08 r5:00001000 r4:eb4d7000 r10:61c88647 r9:84cc8000 r8:8550baac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8dad4000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:224:5527 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:224 state:D stack:0 pid:5527 tgid:5527 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb49d84 r8:00000002 r7:60000013 r6:ebb49d8c r5:84cc8c00 r4:84cc8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cc8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8565938c r4:85659000 r4:8550bb80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:84cc9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebb4dfb0 to 0xebb4dff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:226:5531 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:226 state:D stack:0 pid:5531 tgid:5531 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb45d84 r8:00000002 r7:60000113 r6:ebb45d8c r5:84cca400 r4:84cca400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cca400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb45e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85520d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cca400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb54f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565978c r4:85659400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8565978c r4:8550bd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cca400 r8:8550bdac r7:82804d40 r6:dddced40 r5:dddced60 r4:8550bd80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550bd80 r8:8027ecf4 r7:ebb4de60 r6:8550be00 r5:84cca400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb45fb0 to 0xebb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84583fc0 INFO: task kworker/0:226:5531 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8e3fe000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84ccb000 r4:829189bc r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f8200 INFO: task kworker/0:227:5532 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8e3fe000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84ccbc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb59e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f8380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ccbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb69d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565a38c r4:8565a000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8565a38c r4:8550bf80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ccbc00 r8:8550bfac r7:82804d40 r6:dddced40 r5:dddced60 r4:8550bf80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550bf80 r8:8027ecf4 r7:ebb51e60 r6:85211000 r5:84ccbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb59fb0 to 0xebb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f8240 INFO: task kworker/0:228:5536 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 dd60: 800f0113 ffffffff r4:e06cddc0 r4:00000000 r5:84ff7f8c r4:84ff7c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:229:5537 blocked for more than 466 seconds. r5:84ccc800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb5de08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85211080 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:e06cddc0 r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:230:5539 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:230 state:D stack:0 pid:5539 tgid:5539 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb61d84 r8:00000002 r7:60000113 r6:ebb61d8c r5:84ccd400 r4:84ccd400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ccd400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb61e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f8440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ccd400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6df000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565a78c r4:8565a400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8565a78c r4:85211180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ccd400 r8:852111ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85211180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211180 r8:8027ecf4 r7:ebb5de60 r6:85211200 r5:84ccd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb61fb0 to 0xebb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f8600 INFO: task kworker/0:230:5539 is blocked on a mutex likely owned by task kworker/1:290:3848. [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:231:5541 blocked for more than 466 seconds. r5:84cce000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018005 r8:84cce000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 r10:61c88647 r9:84cce000 r8:852112ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:232:5543 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:232 state:D stack:0 pid:5543 tgid:5543 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb69d84 r8:00000002 r7:60000113 r6:ebb69d8c r5:84ccec00 r4:84ccec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ccec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb69e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f8ac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ccec00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb855000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565b78c r4:8565b400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8565b78c r4:85211380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ccec00 r8:852113ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85211380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211380 r8:8027ecf4 r7:ebb65e60 r6:85211400 r5:84ccec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb69fb0 to 0xebb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f8880 INFO: task kworker/0:232:5543 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8f09d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:233 state:D stack:0 pid:5545 tgid:5545 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85690000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8565b38c r4:8565b000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:844f8b40 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:234:5547 blocked for more than 466 seconds. r5:85690c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85211580 r8:8027ecf4 r7:ebb69e60 r6:85211600 r5:85690c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb71fb0 to 0xebb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f8b00 INFO: task kworker/0:234:5547 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8f8bf000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:235:5549 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:235 state:D stack:0 pid:5549 tgid:5549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb75d84 r8:00000002 r7:60000013 r6:ebb75d8c r5:85691800 r4:85691800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85691800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb75e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f8e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85691800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9a3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565bf8c r4:8565bc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8565bf8c r4:85211680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85691800 r8:852116ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85211680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211680 r8:8027ecf4 r7:ebb71e60 r6:85211700 r5:85691800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb75fb0 to 0xebb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844f8e00 INFO: task kworker/0:235:5549 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 8fc21000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85692400 r4:829189bc r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:5552 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:237 state:D stack:0 pid:5552 tgid:5552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb55d84 r8:00000002 r7:60000113 r6:ebb55d8c r5:85693000 r4:85693000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85693000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb55e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85204040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85693000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ad000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566038c r4:85660000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85693000 r8:852118ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85693c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:8566078c r4:85660400 r4:85211980 dfa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:239:5556 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:239 state:D stack:0 pid:5556 tgid:5556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb81d84 r8:00000002 r7:60000013 r6:ebb81d8c r5:85694800 r4:85694800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85694800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb81e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852043c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85694800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9f7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85660b8c r4:85660800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85660b8c r4:85211a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85694800 r8:85211aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85211a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211a80 r8:8027ecf4 r7:ebb79e60 r6:85211b00 r5:85694800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb81fb0 to 0xebb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85204180 INFO: task kworker/0:239:5556 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9092f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85695400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85211b80 5fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85696000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb8de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85204780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85696000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba25000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566178c r4:85661400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8566178c r4:85211c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85696000 r8:85211cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85211c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211c80 r8:8027ecf4 r7:ebb79e60 r6:85211d00 r5:85696000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb8dfb0 to 0xebb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85204580 INFO: task kworker/0:241:5561 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 90f7f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85696c00 r5:85696c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:85696c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 r10:61c88647 r9:85696c00 r8:85211dac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 800f0113 ffffffff r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:243:5565 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:243 state:D stack:0 pid:5565 tgid:5565 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb95d84 r8:00000002 r7:60000013 r6:ebb95d8c r5:845e0000 r4:845e0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845e0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb95e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85204a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:845e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba43000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85661f8c r4:85661c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85661f8c r4:85211e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845e0000 r8:85211eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85211e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211e80 r8:8027ecf4 r7:ebb91e60 r6:85211f00 r5:845e0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb95fb0 to 0xebb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85204840 INFO: task kworker/0:243:5565 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 914c4000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85004e00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:244:5567 blocked for more than 466 seconds. r5:845e1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/0:245:5569 blocked for more than 466 seconds. r5:845e2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebbb1fb0 to 0xebbb1ff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 91b8e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:246:5570 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:246 state:D stack:0 pid:5570 tgid:5570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebba1d84 r8:00000002 r7:60000013 r6:ebba1d8c r5:845e3c00 r4:845e3c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845e3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844f8f00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:845e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8566278c r4:8547a180 1fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:e06cddc0 r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb99e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85611800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb667000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855db38c r4:855db000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855db38c r4:84db1a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85611800 r8:84db1a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84db1a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84db1a00 r8:8027ecf4 r7:eba49e60 r6:84db1a80 r5:85611800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb99fb0 to 0xebb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85229800 INFO: task kworker/1:968:5573 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 92212000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:ebbb5d84 r8:00000002 r7:60000113 r6:ebbb5d8c r5:85614800 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb5e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84db1b00 r8:8027ecf4 r7:ebb99e60 r6:84db1b80 r5:85614800 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/1:970:5577 blocked for more than 466 seconds. [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84db1c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 92709000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:247:5580 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:247 state:D stack:0 pid:5580 tgid:5580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebbe9d84 r8:00000002 r7:60000113 r6:ebbe9d8c r5:85616000 r4:85616000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85616000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85233100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85616000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbe3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85662f8c r4:85662c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85662f8c r4:8547a280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8547a280 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 r10:829189c0 r9:ebbfdd84 r8:00000002 r7:60000113 r6:ebbfdd8c r5:85616c00 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8547a300 r8:8027ecf4 r7:ebbe9e60 r6:84db1d80 r5:85616c00 r4:85233180 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9296c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:249:5584 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:249 state:D stack:0 pid:5584 tgid:5584 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc01e08 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8566378c r4:85663400 r10:00000000 r9:8547a380 r8:8027ecf4 r7:ebbfde60 r6:84db1e00 r5:8560d400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85233180 INFO: task kworker/0:249:5584 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 92c5d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:250:5590 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:250 state:D stack:0 pid:5590 tgid:5590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebae5d84 r8:00000002 r7:60000113 r6:ebae5d8c r5:85612400 r4:85612400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85612400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae5e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:251:5592 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:251 state:D stack:0 pid:5592 tgid:5592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebaedd84 r8:00000002 r7:60000113 r6:ebaedd8c r5:85618000 r4:85618000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85618000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaede08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85233500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85618000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85663b8c r4:85663800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85663b8c r4:8547a480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85618000 r8:8547a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8547a480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547a480 r8:8027ecf4 r7:ebae5e60 r6:84db1f00 r5:85618000 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 INFO: task kworker/0:252:5593 blocked for more than 467 seconds. [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc0de08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:253:5594 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:5594 tgid:5594 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc11d84 r8:00000002 r7:60000113 r6:ebc11d8c r5:85619800 r4:85619800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85619800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc11e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852338c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85619800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb115000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566cb8c r4:8566c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8566cb8c r4:8547a580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85619800 r8:8547a5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8547a580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547a580 r8:8027ecf4 r7:ebc0de60 r6:8546d000 r5:85619800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb21b000 r7:dddced40 r6:83018000 r5:8566cf8c r4:8547a600 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:5596 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:5596 tgid:5596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc1dd84 r8:00000002 r7:60000013 r6:ebc1dd8c r5:8561bc00 r4:8561bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8561bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc1de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ded4c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8561bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566eb8c r4:8566e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8566eb8c r4:8547a680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561bc00 r8:8547a6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8547a680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547a680 r8:8027ecf4 r7:ebc15e60 r6:8546d100 r5:8561bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc1dfb0 to 0xebc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85233900 INFO: task kworker/0:255:5596 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 93c06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb26f000 r10:61c88647 r9:8561c800 r8:8547a72c r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 942ff000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:257:5600 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:257 state:D stack:0 pid:5600 tgid:5600 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebbcdd84 r8:00000002 r7:60000113 r6:ebbcdd8c r5:845e3000 r4:845e3000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845e3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbcde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85233d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:845e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb427000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566d38c r4:8566d000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8566d38c r4:8547a780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845e3000 r8:8547a7ac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xebbcdfb0 to 0xebbcdff8) Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501e100 Workqueue: events bpf_prog_free_deferred r10:829189c0 r9:ebc25d84 r8:00000002 r7:60000113 r6:ebc25d8c r5:845e4800 r4:845e4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845e4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc25e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85477880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:845e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb58d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566db8c r4:8566d800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8566db8c r4:8547a880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845e4800 r8:8547a8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8547a880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547a880 r8:8027ecf4 r7:ebc1de60 r6:8547a900 r5:845e4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc25fb0 to 0xebc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85233d40 INFO: task kworker/0:258:5602 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 942ff000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:e06cddc0 r4:00000000 r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:971:5605 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:971 state:D stack:0 pid:5605 tgid:5605 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc31d84 r8:00000002 r7:60000013 r6:ebc31d8c r5:845e5400 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc31e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:845e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r5:855db78c r4:855db400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:8546d200 r8:8027ecf4 r7:ebb99e60 r6:8547a980 r5:845e5400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd60: 800f0113 ffffffff r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r5:84ff7f8c r4:84ff7c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:972:5607 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:972 state:D stack:0 pid:5607 tgid:5607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc39d84 r8:00000002 r7:60000113 r6:ebc39d8c r5:845e6000 r4:845e6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845e6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc39e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:845e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8af000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f8b8c r4:841f8800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:841f8b8c r4:8546d280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845e6000 r8:8546d2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546d280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546d280 r8:8027ecf4 r7:ebc31e60 r6:8547aa00 r5:845e6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc39fb0 to 0xebc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85467880 INFO: task kworker/1:972:5607 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 947fd000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:973 state:D stack:0 pid:5608 tgid:5608 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8561d400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc29e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8561d400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7b7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855dbb8c r4:855db800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855dbb8c r4:8546d300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561d400 r8:8546d32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546d300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546d300 r8:8027ecf4 r7:ebc39e60 r6:8546d380 r5:8561d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc29fb0 to 0xebc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85467880 INFO: task kworker/1:973:5608 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 94be8000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:974:5610 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:974 state:D stack:0 pid:5610 tgid:5610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebbd9d84 r8:00000002 r7:60000113 r6:ebbd9d8c r5:8561e000 r4:8561e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8561e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8561e000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855dbf8c r4:855dbc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855dbf8c r4:8546d400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561e000 r8:8546d42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546d400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546d400 r8:8027ecf4 r7:ebc39e60 r6:8546d480 r5:8561e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbd9fb0 to 0xebbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85467940 INFO: task kworker/1:974:5610 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 94be8000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:975:5614 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:975 state:D stack:0 pid:5614 tgid:5614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc35d84 r8:00000002 r7:60000013 r6:ebc35d8c r5:8561ec00 r4:8561ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8561ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc35e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8561ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f878c r4:841f8400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:841f878c r4:8546d500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561ec00 r8:8546d52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546d500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546d500 r8:8027ecf4 r7:ebc39e60 r6:8546d580 r5:8561ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc35fb0 to 0xebc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85467d40 INFO: task kworker/1:975:5614 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 94f2e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:976:5615 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:976 state:D stack:0 pid:5615 tgid:5615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc45d84 r8:00000002 r7:60000113 r6:ebc45d8c r5:8561b000 r4:8561b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8561b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc45e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8561b000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb925000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f838c r4:841f8000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:841f838c r4:8546d600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561b000 r8:8546d62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546d600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546d600 r8:8027ecf4 r7:ebc35e60 r6:8546d680 r5:8561b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc45fb0 to 0xebc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85467e80 INFO: task kworker/1:976:5615 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 953a9000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:977:5617 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:977 state:D stack:0 pid:5617 tgid:5617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc49d84 r8:00000002 r7:60000013 r6:ebc49d8c r5:85613c00 r4:85613c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85613c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc49e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85229100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85613c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb937000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fc38c r4:855fc000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855fc38c r4:8546d700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85613c00 r8:8546d72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546d700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546d700 r8:8027ecf4 r7:ebc45e60 r6:8546d780 r5:85613c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc49fb0 to 0xebc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85229c80 INFO: task kworker/1:977:5617 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 953a9000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:978:5619 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:978 state:D stack:0 pid:5619 tgid:5619 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc4dd84 r8:00000002 r7:60000113 r6:ebc4dd8c r5:85628000 r4:85628000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85628000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc4de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547c240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85628000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba3d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fcf8c r4:855fcc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855fcf8c r4:8546d800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85628000 r8:8546d82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546d800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546d800 r8:8027ecf4 r7:ebc49e60 r6:8546d880 r5:85628000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc4dfb0 to 0xebc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85467100 INFO: task kworker/1:978:5619 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 95948000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:979:5622 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:979 state:D stack:0 pid:5622 tgid:5622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc51d84 r8:00000002 r7:60000013 r6:ebc51d8c r5:85628c00 r4:85628c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85628c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc51e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85233f00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85628c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb947000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fc78c r4:855fc400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855fc78c r4:8546d900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85628c00 r8:8546d92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546d900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546d900 r8:8027ecf4 r7:ebc4de60 r6:8546d980 r5:85628c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc51fb0 to 0xebc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547c0c0 INFO: task kworker/1:979:5622 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 95948000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:980:5623 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:980 state:D stack:0 pid:5623 tgid:5623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc55d84 r8:00000002 r7:60000013 r6:ebc55d8c r5:85629800 r4:85629800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85629800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc55e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547c000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85629800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb95f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fcb8c r4:855fc800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855fcb8c r4:8546da00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85629800 r8:8546da2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546da00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546da00 r8:8027ecf4 r7:ebc4de60 r6:8546da80 r5:85629800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc55fb0 to 0xebc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547c0c0 INFO: task kworker/1:980:5623 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 95e11000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:981:5625 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:981 state:D stack:0 pid:5625 tgid:5625 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc5dd84 r8:00000002 r7:60000113 r6:ebc5dd8c r5:84e89800 r4:84e89800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e89800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc5de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547c400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e89800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba59000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fd38c r4:855fd000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855fd38c r4:8546db00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e89800 r8:8546db2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546db00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546db00 r8:8027ecf4 r7:ebc4de60 r6:8547aa80 r5:84e89800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc5dfb0 to 0xebc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547c200 INFO: task kworker/1:981:5625 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 95e11000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:982:5627 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:982 state:D stack:0 pid:5627 tgid:5627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc61d84 r8:00000002 r7:60000013 r6:ebc61d8c r5:84e88000 r4:84e88000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e88000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc61e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547c4c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e88000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba6b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fd78c r4:855fd400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855fd78c r4:8546db80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e88000 r8:8546dbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546db80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546db80 r8:8027ecf4 r7:ebc5de60 r6:8547ab00 r5:84e88000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc61fb0 to 0xebc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547c3c0 INFO: task kworker/1:982:5627 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9605e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:983:5629 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:983 state:D stack:0 pid:5629 tgid:5629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc65d84 r8:00000002 r7:60000113 r6:ebc65d8c r5:84e8b000 r4:84e8b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e8b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc65e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547c600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e8b000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba7d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fdb8c r4:855fd800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855fdb8c r4:8546dc00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e8b000 r8:8546dc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546dc00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546dc00 r8:8027ecf4 r7:ebc61e60 r6:8547ab80 r5:84e8b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc65fb0 to 0xebc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547c500 INFO: task kworker/1:983:5629 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9605e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:984:5631 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:984 state:D stack:0 pid:5631 tgid:5631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc69d84 r8:00000002 r7:60000113 r6:ebc69d8c r5:84e8bc00 r4:84e8bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e8bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc69e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547c880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e8bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaad000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fe38c r4:855fe000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855fe38c r4:8546dc80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e8bc00 r8:8546dcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546dc80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546dc80 r8:8027ecf4 r7:ebc65e60 r6:8547ac00 r5:84e8bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc69fb0 to 0xebc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547c540 INFO: task kworker/1:984:5631 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 963cc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:985:5632 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:985 state:D stack:0 pid:5632 tgid:5632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc6dd84 r8:00000002 r7:60000113 r6:ebc6dd8c r5:84e8c800 r4:84e8c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e8c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc6de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547c740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e8c800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba93000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fdf8c r4:855fdc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855fdf8c r4:8546dd00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e8c800 r8:8546dd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546dd00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546dd00 r8:8027ecf4 r7:ebc69e60 r6:8547ac80 r5:84e8c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc6dfb0 to 0xebc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547c900 INFO: task kworker/1:985:5632 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 963cc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:986:5635 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:986 state:D stack:0 pid:5635 tgid:5635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc75d84 r8:00000002 r7:60000113 r6:ebc75d8c r5:84e8e000 r4:84e8e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e8e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc75e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ca00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e8e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebabb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fe78c r4:855fe400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855fe78c r4:8546dd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e8e000 r8:8546ddac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546dd80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546dd80 r8:8027ecf4 r7:ebc69e60 r6:8547ad00 r5:84e8e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc75fb0 to 0xebc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547c8c0 INFO: task kworker/1:986:5635 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 966f1000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:987:5638 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:987 state:D stack:0 pid:5638 tgid:5638 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc59d84 r8:00000002 r7:60000113 r6:ebc59d8c r5:8562b000 r4:8562b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc59e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547cac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8562b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855feb8c r4:855fe800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855feb8c r4:8546de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562b000 r8:8546de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546de00 r8:8027ecf4 r7:ebc75e60 r6:8546de80 r5:8562b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc59fb0 to 0xebc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547c980 INFO: task kworker/1:987:5638 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 966f1000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:988:5639 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:988 state:D stack:0 pid:5639 tgid:5639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc3dd84 r8:00000002 r7:60000013 r6:ebc3dd8c r5:8562bc00 r4:8562bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc3de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547cd00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8562bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fef8c r4:855fec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855fef8c r4:8546df00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562bc00 r8:8546df2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546df00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546df00 r8:8027ecf4 r7:ebc59e60 r6:8546df80 r5:8562bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc3dfb0 to 0xebc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547c980 INFO: task kworker/1:988:5639 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 966f1000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:989:5642 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:989 state:D stack:0 pid:5642 tgid:5642 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc79d84 r8:00000002 r7:60000113 r6:ebc79d8c r5:8562c800 r4:8562c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc79e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fe140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8562c800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae33000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ffb8c r4:855ff800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855ffb8c r4:84528000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562c800 r8:8452802c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84528000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84528000 r8:8027ecf4 r7:ebc3de60 r6:84528080 r5:8562c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc79fb0 to 0xebc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85467480 INFO: task kworker/1:989:5642 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 96de7000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:990:5643 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:990 state:D stack:0 pid:5643 tgid:5643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc7dd84 r8:00000002 r7:60000013 r6:ebc7dd8c r5:8562d400 r4:8562d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc7de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547cdc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8562d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ff38c r4:855ff000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855ff38c r4:84528100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562d400 r8:8452812c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84528100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84528100 r8:8027ecf4 r7:ebc79e60 r6:84528180 r5:8562d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc7dfb0 to 0xebc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547ccc0 INFO: task kworker/1:990:5643 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 96de7000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:991:5644 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:991 state:D stack:0 pid:5644 tgid:5644 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb2dd84 r8:00000002 r7:60000113 r6:ebb2dd8c r5:8562e000 r4:8562e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb2de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8562e000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04d7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ff78c r4:855ff400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855ff78c r4:84528200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562e000 r8:8452822c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84528200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84528200 r8:8027ecf4 r7:ebc79e60 r6:84528280 r5:8562e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb2dfb0 to 0xebb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547ccc0 INFO: task kworker/1:991:5644 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 96fc2000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:992:5647 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:992 state:D stack:0 pid:5647 tgid:5647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb19d84 r8:00000002 r7:60000113 r6:ebb19d8c r5:8562ec00 r4:8562ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb19e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fe240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8562ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2bf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fff8c r4:855ffc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855fff8c r4:84528300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562ec00 r8:8452832c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84528300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84528300 r8:8027ecf4 r7:ebc79e60 r6:84528380 r5:8562ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb19fb0 to 0xebb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851fe380 INFO: task kworker/1:992:5647 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 96fc2000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:993:5649 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:993 state:D stack:0 pid:5649 tgid:5649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebbddd84 r8:00000002 r7:60000013 r6:ebbddd8c r5:8562a400 r4:8562a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbdde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fe400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8562a400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb35b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b038c r4:856b0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856b038c r4:84528400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562a400 r8:8452842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84528400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84528400 r8:8027ecf4 r7:ebb19e60 r6:84528480 r5:8562a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbddfb0 to 0xebbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851fe1c0 INFO: task kworker/1:993:5649 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9762b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:994:5651 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:994 state:D stack:0 pid:5651 tgid:5651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebbf1d84 r8:00000002 r7:60000013 r6:ebbf1d8c r5:85630000 r4:85630000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85630000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fe980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85630000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b0b8c r4:856b0800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856b0b8c r4:84528500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85630000 r8:8452852c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84528500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84528500 r8:8027ecf4 r7:ebbdde60 r6:84528580 r5:85630000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbf1fb0 to 0xebbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851fe3c0 INFO: task kworker/1:994:5651 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9762b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:995:5653 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:995 state:D stack:0 pid:5653 tgid:5653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc09d84 r8:00000002 r7:60000013 r6:ebc09d8c r5:85630c00 r4:85630c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85630c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc09e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fe600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85630c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3d9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b078c r4:856b0400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856b078c r4:84528600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85630c00 r8:8452862c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84528600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84528600 r8:8027ecf4 r7:ebbf1e60 r6:84528680 r5:85630c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc09fb0 to 0xebc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851fe5c0 INFO: task kworker/1:995:5653 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9797f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:259:5656 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:259 state:D stack:0 pid:5656 tgid:5656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc89d84 r8:00000002 r7:60000113 r6:ebc89d8c r5:85633000 r4:85633000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85633000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc89e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520f480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85633000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9bb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566df8c r4:8566dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8566df8c r4:8547ad80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85633000 r8:8547adac r7:82804d40 r6:dddced40 r5:dddced60 r4:8547ad80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547ad80 r8:8027ecf4 r7:ebc1de60 r6:84528700 r5:85633000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc89fb0 to 0xebc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85477480 INFO: task kworker/0:259:5656 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9797f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:996:5657 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:996 state:D stack:0 pid:5657 tgid:5657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc81d84 r8:00000002 r7:60000113 r6:ebc81d8c r5:84e8a400 r4:84e8a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e8a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc81e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fea80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e8a400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b0f8c r4:856b0c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856b0f8c r4:84528780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e8a400 r8:845287ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84528780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84528780 r8:8027ecf4 r7:ebbf1e60 r6:8547ae00 r5:84e8a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc81fb0 to 0xebc81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851fe5c0 INFO: task kworker/1:996:5657 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 97c53000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:997:5660 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:997 state:D stack:0 pid:5660 tgid:5660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc91d84 r8:00000002 r7:60000013 r6:ebc91d8c r5:84e8ec00 r4:84e8ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e8ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc91e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851feb40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e8ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb71d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b138c r4:856b1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856b138c r4:84528800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e8ec00 r8:8452882c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84528800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84528800 r8:8027ecf4 r7:ebc81e60 r6:8547ae80 r5:84e8ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc91fb0 to 0xebc91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851fea00 INFO: task kworker/1:997:5660 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 97eb0000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:998:5662 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:998 state:D stack:0 pid:5662 tgid:5662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc99d84 r8:00000002 r7:60000113 r6:ebc99d8c r5:84e88c00 r4:84e88c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e88c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc99e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fed40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e88c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb839000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b178c r4:856b1400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856b178c r4:84528880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e88c00 r8:845288ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84528880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84528880 r8:8027ecf4 r7:ebc91e60 r6:8547af00 r5:84e88c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc99fb0 to 0xebc99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851feb80 INFO: task kworker/1:998:5662 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 97eb0000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:999:5663 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:999 state:D stack:0 pid:5663 tgid:5663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc9dd84 r8:00000002 r7:60000013 r6:ebc9dd8c r5:838a2400 r4:838a2400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838a2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc9de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547e380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:838a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba39000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b2f8c r4:856b2c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856b2f8c r4:84528900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838a2400 r8:8452892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84528900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84528900 r8:8027ecf4 r7:ebc99e60 r6:8547af80 r5:838a2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc9dfb0 to 0xebc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851feb80 INFO: task kworker/1:999:5663 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 981f8000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1000:5665 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1000 state:D stack:0 pid:5665 tgid:5665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebca5d84 r8:00000002 r7:60000013 r6:ebca5d8c r5:845e0c00 r4:845e0c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845e0c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fefc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:845e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb861000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b1b8c r4:856b1800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856b1b8c r4:84528980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845e0c00 r8:845289ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84528980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84528980 r8:8027ecf4 r7:ebc9de60 r6:838d3280 r5:845e0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebca5fb0 to 0xebca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845e6c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcade08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:856b1f8c r4:856b1c00 r10:00000000 r9:84528a00 r8:8027ecf4 r7:ebc9de60 r6:838d3200 r5:845e6c00 INFO: task kworker/1:1001:5667 is blocked on a mutex likely owned by task kworker/1:290:3848. [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:260:5670 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:260 state:D stack:0 pid:5670 tgid:5670 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc85d84 r8:00000002 r7:60000113 r6:ebc85d8c r5:85698000 r4:85698000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85698000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc85e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ded3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85698000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7b9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566e78c r4:8566e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8566e78c r4:85209000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85698000 r8:8520902c r7:82804d40 r6:dddced40 r5:dddced60 r4:85209000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85209000 r8:8027ecf4 r7:ebc1de60 r6:85209080 r5:85698000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8520f440 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r5:84ff7f8c r4:84ff7c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8501e100 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb5e08 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84528b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84528b00 r8:8027ecf4 r7:ebc9de60 r6:84528b80 r5:85631800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebca9fb0 to 0xebca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547e080 INFO: task kworker/1:1003:5673 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 98c88000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1004:5675 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1004 state:D stack:0 pid:5675 tgid:5675 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebcb9d84 r8:00000002 r7:60000013 r6:ebcb9d8c r5:85634800 r4:85634800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85634800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547e1c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85634800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba23000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b2b8c r4:856b2800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856b2b8c r4:84528c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85634800 r8:84528c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84528c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84528c00 r8:8027ecf4 r7:ebc9de60 r6:84528c80 r5:85634800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcb9fb0 to 0xebcb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547e300 INFO: task kworker/1:1004:5675 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 98d1e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 r4:00000000 r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:ebcbdd84 r8:00000002 r7:60000113 r6:ebcbdd8c r5:85635400 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcbde08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:85635400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 r5:856b338c r4:856b3000 r10:61c88647 r9:85635400 r8:84528d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1006:5680 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1006 state:D stack:0 pid:5680 tgid:5680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebcc5d84 r8:00000002 r7:60000113 r6:ebcc5d8c r5:85636000 r4:85636000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85636000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547e680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85636000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb23000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b378c r4:856b3400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856b378c r4:84528e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85636000 r8:84528e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84528e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84528e00 r8:8027ecf4 r7:ebcbde60 r6:84528e80 r5:85636000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcc5fb0 to 0xebcc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547e400 INFO: task kworker/1:1006:5680 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9961f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e06cddc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 INFO: task kworker/1:1007:5681 blocked for more than 467 seconds. r4:8569a400 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebccde08 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:856bdb8c r4:84528f00 Exception stack(0xebccdfb0 to 0xebccdff8) Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06cdfb0 to 0xe06cdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1008:5684 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1008 state:D stack:0 pid:5684 tgid:5684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebcd9d84 r8:00000002 r7:60000113 r6:ebcd9d8c r5:8569bc00 r4:8569bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8569bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547e780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8569bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b3b8c r4:856b3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856b3b8c r4:84528f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8569bc00 r8:84528fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84528f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84528f80 r8:8027ecf4 r7:ebccde60 r6:85209200 r5:8569bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcd9fb0 to 0xebcd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547e700 INFO: task kworker/1:1008:5684 is blocked on a mutex likely owned by task kworker/1:290:3848. Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1009:5685 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1009 state:D stack:0 pid:5685 tgid:5685 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebcddd84 r8:00000002 r7:60000113 r6:ebcddd8c r5:8569c800 r4:8569c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8569c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcdde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:854fc000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84ff7f8c r4:84ff7c00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85698c00 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:854fc080 r8:8027ecf4 r7:ebccde60 r6:85209300 r5:85698c00 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 Call trace: [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547eb00 r5:856bc78c r4:856bc400 r10:00000000 r9:854fc100 r8:8027ecf4 r7:ebccde60 r6:85209380 r5:8569d400 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 99ec9000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1012:5691 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1012 state:D stack:0 pid:5691 tgid:5691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebcf5d84 r8:00000002 r7:60000113 r6:ebcf5d8c r5:8569e000 r4:8569e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8569e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ec80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8569e000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbdf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856bcb8c r4:856bc800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856bcb8c r4:854fc180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8569e000 r8:854fc1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:854fc180 r8:8027ecf4 r7:ebccde60 r6:85209400 r5:8569e000 INFO: task kworker/1:1012:5691 is blocked on a mutex likely owned by task kworker/1:290:3848. dd60: 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ebbeb000 r7:ddde2d40 r6:83018200 r5:856bcf8c r4:854fc200 Exception stack(0xebcfdfb0 to 0xebcfdff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9a4f5000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1014:5695 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1014 state:D stack:0 pid:5695 tgid:5695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebcc9d84 r8:00000002 r7:60000013 r6:ebcc9d8c r5:85636c00 r4:85636c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85636c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ccc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85636c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc05000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856bd38c r4:856bd000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856bd38c r4:854fc280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85636c00 r8:854fc2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:854fc280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc280 r8:8027ecf4 r7:ebccde60 r6:854fc300 r5:85636c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcc9fb0 to 0xebcc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547ee00 INFO: task kworker/1:1014:5695 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9a56c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1015:5706 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:829189c0 r9:ebd01d84 r8:00000002 r7:60000113 r6:ebd01d8c r5:85633c00 r4:85633c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85633c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd01e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85515000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85633c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd0b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856bd78c r4:856bd400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856bd78c r4:854fc380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85633c00 r8:854fc3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:854fc380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc380 r8:8027ecf4 r7:ebccde60 r6:854fc400 r5:85633c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd01fb0 to 0xebd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85515740 INFO: task kworker/1:1015:5706 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9a659000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:854fc480 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: 9a8c9000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r4:e06cddc0 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1017:5708 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1017 state:D stack:0 pid:5708 tgid:5708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebd39d84 r8:00000002 r7:60000113 r6:ebd39d8c r5:84e8d400 r4:84e8d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e8d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd39e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85515300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84e8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeed000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856be38c r4:856be000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856be38c r4:854fc580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e8d400 r8:854fc5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:854fc580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc580 r8:8027ecf4 r7:ebb35e60 r6:854fc600 r5:84e8d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd39fb0 to 0xebd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85515740 INFO: task kworker/1:1017:5708 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9a8c9000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Call trace: r5:85638000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd3de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85515440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85638000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb069000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856be78c r4:856be400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856be78c r4:854fc680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85638000 r8:854fc6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:854fc680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc680 r8:8027ecf4 r7:ebd39e60 r6:854fc700 r5:85638000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd3dfb0 to 0xebd3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85515740 INFO: task kworker/1:1018:5709 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9ad69000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1019:5710 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1019 state:D stack:0 pid:5710 tgid:5710 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebd41d84 r8:00000002 r7:60000113 r6:ebd41d8c r5:85638c00 r4:85638c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85638c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd41e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85515500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85638c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb237000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856beb8c r4:856be800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856beb8c r4:854fc780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85638c00 r8:854fc7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:854fc780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc780 r8:8027ecf4 r7:ebd3de60 r6:854fc800 r5:85638c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd41fb0 to 0xebd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85515740 INFO: task kworker/1:1019:5710 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9af69000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1020:5712 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1020 state:D stack:0 pid:5712 tgid:5712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebd49d84 r8:00000002 r7:60000113 r6:ebd49d8c r5:8563a400 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd49e08 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb627000 r7:ddde2d40 r6:83018200 r5:856bf38c r4:854fc880 r10:00000000 r9:854fc880 r8:8027ecf4 r7:ebd41e60 r6:854fc900 r5:8563a400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe06cdd20 to 0xe06cdd68) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1021:5713 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1021 state:D stack:0 pid:5713 tgid:5713 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebd4dd84 r8:00000002 r7:60000013 r6:ebd4dd8c r5:8563b000 r4:8563b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8563b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd4de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85515340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8563b000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ed000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856bef8c r4:856bec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856bef8c r4:854fc980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8563b000 r8:854fc9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:854fc980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc980 r8:8027ecf4 r7:ebd49e60 r6:854fca00 r5:8563b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd4dfb0 to 0xebd4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85515740 INFO: task kworker/1:1021:5713 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9b276000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd60: 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85515740 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:00000000 r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1023:5715 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1023 state:D stack:0 pid:5715 tgid:5715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebd55d84 r8:00000002 r7:60000113 r6:ebd55d8c r5:8563c800 r4:8563c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8563c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd55e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520fe00 r5:00001000 r4:eba55000 r10:00000000 r9:854fcb80 r8:8027ecf4 r7:ebd51e60 r6:854fcc00 r5:8563c800 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:261:5717 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:261 state:D stack:0 pid:5717 tgid:5717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebd45d84 r8:00000002 r7:60000013 r6:ebd45d8c r5:84f88c00 r4:84f88c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f88c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd45e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ded880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84f88c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8566f38c r4:85209500 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 dfa0: 00000000 00000000 00000000 00000000 r5:84f8b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ded440 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Call trace: r4:82ac11e4 r4:00000000 r5:84ff7f8c r4:84ff7c00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 task:kworker/0:263 state:D stack:0 pid:5720 tgid:5720 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd5de08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ded900 INFO: task kworker/0:263:5720 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9bd98000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:264:5723 blocked for more than 468 seconds. r5:84f8a400 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd61e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/0:264:5723 is blocked on a mutex likely owned by task kworker/1:290:3848. r4:e06cddc0 r5:84ff7f8c r4:84ff7c00 dfa0: 00000000 00000000 00000000 00000000 r5:84f8e000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r5:84c0cb8c r4:84c0c800 Exception stack(0xebd65fb0 to 0xebd65ff8) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:266:5728 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:266 state:D stack:0 pid:5728 tgid:5728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84f8bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dedf40 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800f0113 r4:80239bb0 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:267:5729 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:267 state:D stack:0 pid:5729 tgid:5729 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebd75d84 r8:00000002 r7:60000113 r6:ebd75d8c r5:84f8ec00 r4:84f8ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f8ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd75e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85023240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84f8ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba85000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c0c78c r4:84c0c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c0c78c r4:85209b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f8ec00 r8:85209b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85209b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85209b00 r8:8027ecf4 r7:ebd65e60 r6:85209b80 r5:84f8ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd75fb0 to 0xebd75ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:82ac11e4 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:268:5732 blocked for more than 468 seconds. r5:84f8d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f438c r4:856f4000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856f438c r4:85209c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f8d400 r8:85209c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85209c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85209c00 r8:8027ecf4 r7:ebd75e60 r6:85209c80 r5:84f8d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd6dfb0 to 0xebd6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85023200 INFO: task kworker/0:268:5732 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9c844000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r5:84ff7f8c r4:84ff7c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8501e100 Workqueue: events bpf_prog_free_deferred r5:84f89800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebd79fb0 to 0xebd79ff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:8569ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856f4b8c r4:85209e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8569ec00 r8:85209eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85209e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85209e80 r8:8027ecf4 r7:ebd79e60 r6:85209f00 r5:8569ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd7dfb0 to 0xebd7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85023580 INFO: task kworker/0:270:5738 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9cbb5000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:271:5739 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:271 state:D stack:0 pid:5739 tgid:5739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebd81d84 r8:00000002 r7:60000113 r6:ebd81d8c r5:84d00000 r4:84d00000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d00000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd81e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85023880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d00000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebadd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f4f8c r4:856f4c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856f4f8c r4:85209f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d00000 r8:85209fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85209f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85209f80 r8:8027ecf4 r7:ebd7de60 r6:85523000 r5:84d00000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd81fb0 to 0xebd81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85023640 INFO: task kworker/0:271:5739 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9cbb5000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd60: 800f0113 ffffffff r4:e06cddc0 r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:272 state:D stack:0 pid:5742 tgid:5742 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84d00c00 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85023940 r7:dddced40 r6:83018000 r5:856f538c r4:85523080 Exception stack(0xebd85fb0 to 0xebd85ff8) Workqueue: events bpf_prog_free_deferred r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:273:5743 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:273 state:D stack:0 pid:5743 tgid:5743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebd89d84 r8:00000002 r7:60000013 r6:ebd89d8c r5:84d01800 r4:84d01800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d01800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd89e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dedec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d01800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd95000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f638c r4:856f6000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856f638c r4:85523180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84d02400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:274:5744 is blocked on a mutex likely owned by task kworker/1:290:3848. dd60: 800f0113 ffffffff r4:e06cddc0 r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:84d03000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:856f5b8c r4:85523380 Exception stack(0xebd99fb0 to 0xebd99ff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9d9a2000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:276:5748 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:276 state:D stack:0 pid:5748 tgid:5748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebda1d84 r8:00000002 r7:60000113 r6:ebda1d8c r5:84d04800 r4:84d04800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d04800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebda1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e07d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d04800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd69000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85023f80 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:277:5751 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:277 state:D stack:0 pid:5751 tgid:5751 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebdadd84 r8:00000002 r7:60000113 r6:ebdadd8c r5:84d03c00 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdade08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551c2c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdb5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f6b8c r4:856f6800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856f6b8c r4:85523580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d03c00 r8:855235ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85523580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85523580 r8:8027ecf4 r7:ebd89e60 r6:85523600 r5:84d03c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdadfb0 to 0xebdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85023c80 INFO: task kworker/0:277:5751 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:278:5752 blocked for more than 468 seconds. [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:856f678c r4:85523680 Exception stack(0xebdb9fb0 to 0xebdb9ff8) Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84d06000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9e45e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:280:5757 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:280 state:D stack:0 pid:5757 tgid:5757 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551c4c0 r7:dddced40 r6:83018000 r5:856f6f8c r4:85523880 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:281 state:D stack:0 pid:5759 tgid:5759 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551c6c0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9e602000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:282:5761 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:282 state:D stack:0 pid:5761 tgid:5761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebdf5d84 r8:00000002 r7:60000013 r6:ebdf5d8c r5:8563e000 r4:8563e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8563e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdf5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551cb80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8563e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec607000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570038c r4:85700000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8563e000 r8:855239ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8551c780 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 Not tainted 6.15.0-syzkaller #0 r5:85760000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:856f7b8c r4:856f7800 r10:61c88647 r9:85760000 r8:85523a2c r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 r4:00000000 r5:84ff7f8c r4:84ff7c00 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:284:5764 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:284 state:D stack:0 pid:5764 tgid:5764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebda5d84 r8:00000002 r7:60000113 r6:ebda5d8c r5:84d05400 r4:84d05400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d05400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebda5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551c9c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d05400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec601000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f7f8c r4:856f7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856f7f8c r4:85523a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d05400 r8:85523aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85523a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85523a80 r8:8027ecf4 r7:ebdf5e60 r6:85523b00 r5:84d05400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebda5fb0 to 0xebda5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8551c800 INFO: task kworker/0:284:5764 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9ea62000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85523b80 r8:8027ecf4 r7:ebdf5e60 r6:85523c00 r5:85730000 r4:8551c900 Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:286:5768 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:286 state:D stack:0 pid:5768 tgid:5768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec615d84 r8:00000002 r7:60000013 r6:ec615d8c r5:85730c00 r4:85730c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85730c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec615e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551cc40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85730c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570078c r4:85700400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8570078c r4:85523c80 r10:00000000 r9:85523c80 r8:8027ecf4 r7:ebdfde60 r6:85523d00 r5:85730c00 r4:8551cc80 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85523d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfd83000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:288 state:D stack:0 pid:5773 tgid:5773 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018005 r8:85732400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 r10:61c88647 r9:85732400 r8:85523eac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 9f925000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85503340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85733000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec641000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570178c r4:85701400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8570178c r4:85523f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85733000 r8:85523fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85523f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85523f80 r8:8027ecf4 r7:ebdcde60 r6:854f4000 r5:85733000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec639fb0 to 0xec639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85503180 INFO: task kworker/0:289:5775 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: 9f925000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:290:5777 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:290 state:D stack:0 pid:5777 tgid:5777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec645d84 r8:00000002 r7:60000113 r6:ec645d8c r5:85733c00 r4:85733c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85733c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec645e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855034c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85733c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 r7:dddced40 r6:83018000 r5:85701b8c r4:854f4080 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 dd20: 9fdc6000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r4:e06cddc0 r4:00000000 r5:84ff7f8c r4:84ff7c00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 INFO: task kworker/0:291:5779 blocked for more than 468 seconds. r5:85734800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85503640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85734800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec655000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85701f8c r4:85701c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85701f8c r4:854f4180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85734800 r8:854f41ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f4180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f4180 r8:8027ecf4 r7:ec645e60 r6:854f4200 r5:85734800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec64dfb0 to 0xec64dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85503280 INFO: task kworker/0:291:5779 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a0129000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501e100 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8570238c r4:854f4280 Exception stack(0xec631fb0 to 0xec631ff8) Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:293 state:D stack:0 pid:5783 tgid:5783 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018005 r8:85736000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 r10:61c88647 r9:85736000 r8:854f43ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:294:5785 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:294 state:D stack:0 pid:5785 tgid:5785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec66dd84 r8:00000002 r7:60000113 r6:ec66dd8c r5:85736c00 r4:85736c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85736c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec66de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85503d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85736c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaed000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570338c r4:85703000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8570338c r4:854f4480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85736c00 r8:854f44ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f4480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f4480 r8:8027ecf4 r7:ec659e60 r6:854f4500 r5:85736c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec66dfb0 to 0xec66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85503900 INFO: task kworker/0:294:5785 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a05c1000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r5:00001000 r4:ec677000 r10:61c88647 r9:84d20000 r8:854f45ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:296:5791 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:296 state:D stack:0 pid:5791 tgid:5791 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec681d84 r8:00000002 r7:60000113 r6:ec681d8c r5:84d20c00 r4:84d20c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d20c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec681e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85503c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d20c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85702f8c r4:85702c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85702f8c r4:854f4680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d20c00 r8:854f46ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f4680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f4680 r8:8027ecf4 r7:ec66de60 r6:854f4700 r5:84d20c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r4:00000000 r5:84ff7f8c r4:84ff7c00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84567440 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8501e100 task:kworker/0:298 state:D stack:0 pid:5794 tgid:5794 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec689e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85503fc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d22400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb579000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856c438c r4:856c4000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856c438c r4:854f4880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d22400 r8:854f48ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f4880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f4880 r8:8027ecf4 r7:ec661e60 r6:854f4900 r5:84d22400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec689fb0 to 0xec689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85503d40 INFO: task kworker/0:298:5794 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a0deb000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:299:5797 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:299 state:D stack:0 pid:5797 tgid:5797 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829189c0 r9:ec685d84 r8:00000002 r7:60000113 r6:ec685d8c r5:84d23000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:85703b8c r4:85703800 r10:00000000 r9:854f4980 r8:8027ecf4 r7:ec661e60 r6:854f4a00 r5:84d23000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:84c0d38c r4:854f4b00 r4:00000001 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:301:5863 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:301 state:D stack:0 pid:5863 tgid:5863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec71dd84 r8:00000002 r7:60000113 r6:ec71dd8c r5:84d24800 r4:84d24800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d24800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec71de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d4f980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d24800 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d9f8c r4:856d9c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856d9f8c r4:854f4c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d24800 r8:854f4c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f4c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f4c00 r8:8027ecf4 r7:ec68de60 r6:854f4c80 r5:84d24800 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r4:00000000 r5:84ff7f8c r4:84ff7c00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 INFO: task kworker/0:302:5864 blocked for more than 469 seconds. [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:303 state:D stack:0 pid:5884 tgid:5884 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec721e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84567c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d25400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7a7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571038c r4:85710000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571038c r4:854f4e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d25400 r8:854f4e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f4e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f4e00 r8:8027ecf4 r7:ec71de60 r6:854f4e80 r5:84d25400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec721fb0 to 0xec721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845674c0 INFO: task kworker/0:303:5884 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a1ecd000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84c98c00 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8571078c r4:85710400 r10:61c88647 r9:84c98c00 r8:854f4f2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca1200 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c9a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdbd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571138c r4:85711000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571138c r4:8541c000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c9a400 r8:8541c02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8541c000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541c000 r8:8027ecf4 r7:ec71de60 r6:8541c080 r5:84c9a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec769fb0 to 0xec769ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84567b40 INFO: task kworker/0:305:5899 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a1f9f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:306:5900 blocked for more than 469 seconds. task:kworker/0:306 state:D stack:0 pid:5900 tgid:5900 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7b9e08 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85710f8c r4:8541c100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c9b000 r8:8541c12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8541c100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541c100 r8:8027ecf4 r7:ec769e60 r6:8541c180 r5:84c9b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7b9fb0 to 0xec7b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84567b40 INFO: task kworker/0:306:5900 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a219f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:84ff7f8c r4:84ff7c00 r4:85004e00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:84c9bc00 [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec801e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852387c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f11d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec851000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856e138c r4:856e1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856e138c r4:8541c200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c9bc00 r8:8541c22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8541c200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541c200 r8:8027ecf4 r7:ec769e60 r6:8541c280 r5:84c9bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec801fb0 to 0xec801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84567900 INFO: task kworker/0:307:5903 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a26b7000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:308:5915 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:308 state:D stack:0 pid:5915 tgid:5915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec805d84 r8:00000002 r7:60000013 r6:ec805d8c r5:84c9c800 r4:84c9c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c9c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec805e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85250700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb983000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85711f8c r4:85711c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85711f8c r4:8541c300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c9c800 r8:8541c32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8541c300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541c300 r8:8027ecf4 r7:ec801e60 r6:8541c380 r5:84c9c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec805fb0 to 0xec805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca1140 INFO: task kworker/0:308:5915 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a26b7000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:309:5938 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:309 state:D stack:0 pid:5938 tgid:5938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec85dd84 r8:00000002 r7:60000113 r6:ec85dd8c r5:84c9e000 r4:84c9e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c9e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec85de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852504c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6eb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85711b8c r4:85711800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85711b8c r4:8541c400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c9e000 r8:8541c42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8541c400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541c400 r8:8027ecf4 r7:ec805e60 r6:8541c480 r5:84c9e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec85dfb0 to 0xec85dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85250580 INFO: task kworker/0:309:5938 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a2ab9000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:310:5940 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:310 state:D stack:0 pid:5940 tgid:5940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec859d84 r8:00000002 r7:60000013 r6:ec859d8c r5:84c9ec00 r4:84c9ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c9ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec859e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85250980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c9ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571278c r4:85712400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571278c r4:8541c500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c9ec00 r8:8541c52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8541c500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541c500 r8:8027ecf4 r7:ec805e60 r6:8541c580 r5:84c9ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec859fb0 to 0xec859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852506c0 INFO: task kworker/0:310:5940 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a2ab9000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:311:5942 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:311 state:D stack:0 pid:5942 tgid:5942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec80dd84 r8:00000002 r7:60000113 r6:ec80dd8c r5:84c98000 r4:84c98000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c98000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec80de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85250800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c98000 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba11000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571238c r4:85712000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571238c r4:8541c600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c98000 r8:8541c62c r7:82804d40 r6:dddced40 r5:dddced60 r4:8541c600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541c600 r8:8027ecf4 r7:ec859e60 r6:8541c680 r5:84c98000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec80dfb0 to 0xec80dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85250780 INFO: task kworker/0:311:5942 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a2f93000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:312:5944 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:312 state:D stack:0 pid:5944 tgid:5944 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec861d84 r8:00000002 r7:60000013 r6:ec861d8c r5:84c9d400 r4:84c9d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c9d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec861e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85250c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c9d400 r7:00000000 r6:83018000 r5:00001000 r4:7f123000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85712b8c r4:85712800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85712b8c r4:8541c700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c9d400 r8:8541c72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8541c700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541c700 r8:8027ecf4 r7:ec859e60 r6:8541c780 r5:84c9d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec861fb0 to 0xec861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852508c0 INFO: task kworker/0:312:5944 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a3463000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:313:5947 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:313 state:D stack:0 pid:5947 tgid:5947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec809d84 r8:00000002 r7:60000113 r6:ec809d8c r5:84c99800 r4:84c99800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c99800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec809e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85250d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c99800 r7:00000000 r6:83018000 r5:00001000 r4:7f125000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc95000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85712f8c r4:85712c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85712f8c r4:8541c800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c99800 r8:8541c82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8541c800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541c800 r8:8027ecf4 r7:ec861e60 r6:8541c880 r5:84c99800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec809fb0 to 0xec809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85250bc0 INFO: task kworker/0:313:5947 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a3463000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:314:5949 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:314 state:D stack:0 pid:5949 tgid:5949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec86dd84 r8:00000002 r7:60000013 r6:ec86dd8c r5:85766c00 r4:85766c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85766c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec86de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85250e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85766c00 r7:00000000 r6:83018000 r5:00001000 r4:7f127000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebccf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571338c r4:85713000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571338c r4:8541c900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85766c00 r8:8541c92c r7:82804d40 r6:dddced40 r5:dddced60 r4:8541c900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541c900 r8:8027ecf4 r7:ec809e60 r6:854fcf80 r5:85766c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec86dfb0 to 0xec86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85250cc0 INFO: task kworker/0:314:5949 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a3463000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:315:5953 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:315 state:D stack:0 pid:5953 tgid:5953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec87dd84 r8:00000002 r7:60000113 r6:ec87dd8c r5:85760c00 r4:85760c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85760c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec87de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85250f80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85760c00 r7:00000000 r6:83018000 r5:00001000 r4:7f129000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebce9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571378c r4:85713400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571378c r4:8541c980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85760c00 r8:8541c9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8541c980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541c980 r8:8027ecf4 r7:ec86de60 r6:845ba000 r5:85760c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec87dfb0 to 0xec87dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca1280 INFO: task kworker/0:315:5953 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a3463000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:316:5955 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:316 state:D stack:0 pid:5955 tgid:5955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec885d84 r8:00000002 r7:60000013 r6:ec885d8c r5:85765400 r4:85765400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85765400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec885e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca1340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85765400 r7:00000000 r6:83018000 r5:00001000 r4:7f12b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd09000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85713b8c r4:85713800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85713b8c r4:8541ca00 r10:00000000 r9:8541ca00 r8:8027ecf4 r7:ec87de60 r6:845ba080 r5:85765400 r4:85250240 Call trace: dd60: 800f0113 ffffffff r4:e06cddc0 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:317:5956 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:317 state:D stack:0 pid:5956 tgid:5956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec889d84 r8:00000002 r7:60000013 r6:ec889d8c r5:85763c00 r4:85763c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85763c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec889e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e05240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85763c00 r7:00000000 r6:83018000 r5:00001000 r4:7f131000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec73d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c0db8c r4:84c0d800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c0db8c r4:8541ca80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85763c00 r8:8541caac r7:82804d40 r6:dddced40 r5:dddced60 r4:8541ca80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541ca80 r8:8027ecf4 r7:ec885e60 r6:845ba100 r5:85763c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec889fb0 to 0xec889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85250240 INFO: task kworker/0:317:5956 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a3b0f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:85766000 r7:00000000 r6:83018000 r5:00001000 r4:7f12d000 r5:85713f8c r4:85713c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85713f8c r4:8541cb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85766000 r8:8541cb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8541cb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541cb00 r8:8027ecf4 r7:ec889e60 r6:845ba180 r5:85766000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec88dfb0 to 0xec88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e05140 INFO: task kworker/0:318:5957 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a3cd8000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:319:5959 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:319 state:D stack:0 pid:5959 tgid:5959 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e05000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85761800 r7:00000000 r6:83018000 r5:00001000 r4:7f12f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec733000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c0df8c r4:84c0dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c0df8c r4:8541cb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85761800 r8:8541cbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8541cb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541cb80 r8:8027ecf4 r7:ec889e60 r6:845ba200 r5:85761800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec891fb0 to 0xec891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e05140 INFO: task kworker/0:319:5959 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a42e3000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:320:5960 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:320 state:D stack:0 pid:5960 tgid:5960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec895d84 r8:00000002 r7:60000013 r6:ec895d8c r5:85763000 r4:85763000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85763000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec895e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e05700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85763000 r7:00000000 r6:83018000 r5:00001000 r4:7f139000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8571c78c r4:8541cc00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a42e3000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e61800 r5:84e61800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e05580 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/0:322:5967 blocked for more than 469 seconds. r5:84e60000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8541cd80 r8:8027ecf4 r7:ec895e60 r6:8541ce00 r5:84e60000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e05600 INFO: task kworker/0:322:5967 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a4853000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:323:5969 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:323 state:D stack:0 pid:5969 tgid:5969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec8a9d84 r8:00000002 r7:60000113 r6:ec8a9d8c r5:84e60c00 r4:84e60c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e60c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e05ac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e60c00 r7:00000000 r6:83018000 r5:00001000 r4:7f13d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec77b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571cf8c r4:8571cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571cf8c r4:8541ce80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e60c00 r8:8541ceac r7:82804d40 r6:dddced40 r5:dddced60 r4:8541ce80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541ce80 r8:8027ecf4 r7:ec8a5e60 r6:8541cf00 r5:84e60c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a9fb0 to 0xec8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e058c0 INFO: task kworker/0:323:5969 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:84e63000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e63000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e05b80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e63000 r7:00000000 r6:83018000 r5:00001000 r4:7f13f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec78b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571d38c r4:8571d000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571d38c r4:8541cf80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e63000 r8:8541cfac r7:82804d40 r6:dddced40 r5:dddced60 r4:8541cf80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541cf80 r8:8027ecf4 r7:ec8a9e60 r6:85003000 r5:84e63000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a1fb0 to 0xec8a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: dd20: a4e64000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r4:e06cddc0 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:325:5973 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:325 state:D stack:0 pid:5973 tgid:5973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec865d84 r8:00000002 r7:60000013 r6:ec865d8c r5:84e63c00 r4:84e63c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e63c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec865e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e05d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e63c00 r7:00000000 r6:83018000 r5:00001000 r4:7f141000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec79f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571d78c r4:8571d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571d78c r4:85003080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e63c00 r8:850030ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85003080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003080 r8:8027ecf4 r7:ec8a1e60 r6:85003100 r5:84e63c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec865fb0 to 0xec865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e058c0 INFO: task kworker/0:325:5973 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:84ff7f8c r4:84ff7c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/0:326:5975 blocked for more than 469 seconds. r5:84e64800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: a53d5000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:327:5977 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:327 state:D stack:0 pid:5977 tgid:5977 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec8add84 r8:00000002 r7:60000013 r6:ec8add8c r5:84e65400 r4:84e65400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e65400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ade08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e05fc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85003280 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8adfb0 to 0xec8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85238c40 INFO: task kworker/0:327:5977 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a5696000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:ec8b1d84 r8:00000002 r7:60000013 r6:ec8b1d8c r5:84e66000 r5:84e66000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b1e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85003380 r8:8027ecf4 r7:ec8ade60 r6:85003400 r5:84e66000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06cdd20 to 0xe06cdd68) [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dfd83000 r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/0:329:5981 blocked for more than 469 seconds. Workqueue: events bpf_prog_free_deferred r5:84e66c00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8bf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571e78c r4:8571e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571e78c r4:85003480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e66c00 r8:850034ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85003480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003480 r8:8027ecf4 r7:ec8ade60 r6:85003500 r5:84e66c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8b5fb0 to 0xec8b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8552d080 INFO: task kworker/0:329:5981 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a5a8b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/0:330 state:D stack:0 pid:5983 tgid:5983 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84e62400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8552d140 Call trace: dd20: a5a8b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:331:5985 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:331 state:D stack:0 pid:5985 tgid:5985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec8d5d84 r8:00000002 r7:60000013 r6:ec8d5d8c r5:850a8c00 r4:850a8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552d600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f151000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8eb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571eb8c r4:8571e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571eb8c r4:85003680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a8c00 r8:850036ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85003680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003680 r8:8027ecf4 r7:ec8bde60 r6:85003700 r5:850a8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d5fb0 to 0xec8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8552d2c0 INFO: task kworker/0:331:5985 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a5eec000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:850a8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8571ef8c r4:8571ec00 r4:85003780 Exception stack(0xec8f9fb0 to 0xec8f9ff8) INFO: task kworker/0:332:5990 is blocked on a mutex likely owned by task kworker/1:290:3848. dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) Not tainted 6.15.0-syzkaller #0 r5:850ab000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8552d540 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:334:5995 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:334 state:D stack:0 pid:5995 tgid:5995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec905d84 r8:00000002 r7:60000113 r6:ec905d8c r5:850a9800 r4:850a9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec905e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552dcc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f15b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec915000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571fb8c r4:8571f800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571fb8c r4:85003980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a9800 r8:850039ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85003980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003980 r8:8027ecf4 r7:ec90de60 r6:85003a00 r5:850a9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec905fb0 to 0xec905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8552dbc0 INFO: task kworker/0:334:5995 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a659f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:850ac800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec91de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca1280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f15f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec925000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572438c r4:85724000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8572438c r4:85003a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ac800 r8:85003aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85003a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003a80 r8:8027ecf4 r7:ec905e60 r6:85003b00 r5:850ac800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec91dfb0 to 0xec91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8552dc40 INFO: task kworker/0:335:5997 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a659f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:336 state:D stack:0 pid:5999 tgid:5999 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85764800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d1e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85764800 r8:85003c2c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a69c3000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:337:6001 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:337 state:D stack:0 pid:6001 tgid:6001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec92dd84 r8:00000002 r7:60000013 r6:ec92dd8c r5:85762400 r4:85762400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85762400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec92de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85101000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85762400 r7:00000000 r6:83018000 r5:00001000 r4:7f161000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec92f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572478c r4:85724400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8572478c r4:85003b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829189c0 r9:ec945d84 r8:00000002 r7:60000013 r6:ec945d8c r5:85770c00 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85101140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85770c00 r7:00000000 r6:83018000 r5:00001000 r4:7f163000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec935000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85724b8c r4:85724800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85724b8c r4:85003c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85770c00 r8:85003cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85003c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003c80 r8:8027ecf4 r7:ec92de60 r6:845ba400 r5:85770c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec945fb0 to 0xec945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85101280 INFO: task kworker/0:338:6003 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a69c3000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/0:339:6005 blocked for more than 469 seconds. r5:85771800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829189c0 r9:ec95dd84 r8:00000002 r7:60000113 r6:ec95dd8c r5:85770000 r5:85770000 r4:829189bc r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85725f8c r4:85725c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a73f2000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:341:6008 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:341 state:D stack:0 pid:6008 tgid:6008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec961d84 r8:00000002 r7:60000013 r6:ec961d8c r5:85773000 r4:85773000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85773000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec961e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85101380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85773000 r7:00000000 r6:83018000 r5:00001000 r4:7f167000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572538c r4:85725000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8572538c r4:85003e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85773000 r8:85003e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85003e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003e00 r8:8027ecf4 r7:ec95de60 r6:845ba580 r5:85773000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec961fb0 to 0xec961ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 INFO: task kworker/0:341:6008 is blocked on a mutex likely owned by task kworker/1:290:3848. dd20: a73f2000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/0:342:6010 blocked for more than 469 seconds. r4:85774800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85774800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec971e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851014c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85774800 r7:00000000 r6:83018000 r5:00001000 r4:7f169000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec967000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572578c r4:85725400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8572578c r4:85003e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85774800 r8:85003eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85003e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003e80 r8:8027ecf4 r7:ec95de60 r6:845ba600 r5:85774800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec971fb0 to 0xec971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85101680 INFO: task kworker/0:342:6010 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a73f2000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) Not tainted 6.15.0-syzkaller #0 r5:85772400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:344:6016 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:344 state:D stack:0 pid:6016 tgid:6016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec991d84 r8:00000002 r7:60000013 r6:ec991d8c r5:85776000 r4:85776000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85776000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec991e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851019c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85776000 r7:00000000 r6:83018000 r5:00001000 r4:7f171000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec98b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572638c r4:85726000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8572638c r4:85003f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85776000 r8:85003fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85003f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003f80 r8:8027ecf4 r7:ec95de60 r6:845ba700 r5:85776000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec991fb0 to 0xec991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851019c0 INFO: task kworker/0:344:6016 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a7aa9000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:345 state:D stack:0 pid:6018 tgid:6018 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85775400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85512000 r8:8027ecf4 r7:ec991e60 r6:845ba780 r5:85775400 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85773c00 r5:85773c00 r4:829189bc r4:00000000 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85101b00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85773c00 r7:00000000 r6:83018000 r5:00001000 r4:7f173000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec995000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572678c r4:85726400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8572678c r4:85512080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85773c00 r8:855120ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85512080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512080 r8:8027ecf4 r7:ec9a1e60 r6:845ba800 r5:85773c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a5fb0 to 0xec9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85101a80 INFO: task kworker/0:346:6019 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a7e99000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85776c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec9b5fb0 to 0xec9b5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe06cdd20 to 0xe06cdd68) [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:348:6023 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:348 state:D stack:0 pid:6023 tgid:6023 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9c1d84 r8:00000002 r7:60000013 r6:ec9c1d8c r5:85778c00 r4:85778c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85778c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9c1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85101d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85778c00 r7:00000000 r6:83018000 r5:00001000 r4:7f177000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9b1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85726f8c r4:85726c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85726f8c r4:85512180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85778c00 r8:855121ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85512180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512180 r8:8027ecf4 r7:ec9b5e60 r6:845ba900 r5:85778c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9c1fb0 to 0xec9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85101dc0 INFO: task kworker/0:348:6023 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a87af000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 task:kworker/0:349 state:D stack:0 pid:6025 tgid:6025 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8577a400 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8577a400 r8:8551222c r7:82804d40 r6:dddced40 r5:dddced60 r4:85512200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512200 r8:8027ecf4 r7:ec9b5e60 r6:845ba980 r5:8577a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9c9fb0 to 0xec9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85101c80 INFO: task kworker/0:349:6025 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a87af000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r4:00000001 r4:8501e100 Workqueue: events bpf_prog_free_deferred r5:85778000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9e1e08 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85778000 r8:855122ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8552a5c0 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85779800 r4:829189bc r4:00000000 r4:00000000 r5:85727b8c r4:85727800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85101f40 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:352:6032 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:352 state:D stack:0 pid:6032 tgid:6032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9f1d84 r8:00000002 r7:60000113 r6:ec9f1d8c r5:8577b000 r4:8577b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8577b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8577b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85727f8c r4:85727c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85727f8c r4:85512380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577b000 r8:855123ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85512380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512380 r8:8027ecf4 r7:ec9b5e60 r6:845bab00 r5:8577b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9f1fb0 to 0xec9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:84ff7f8c r4:84ff7c00 r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:353:6034 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:353 state:D stack:0 pid:6034 tgid:6034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9f9d84 r8:00000002 r7:60000113 r6:ec9f9d8c r5:8577bc00 r4:8577bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8577bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8577bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb43b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d438c r4:857d4000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d438c r4:85512400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577bc00 r8:8551242c r7:82804d40 r6:dddced40 r5:dddced60 r4:85512400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512400 r8:8027ecf4 r7:ec9b5e60 r6:845bab80 r5:8577bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9f9fb0 to 0xec9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8522f280 INFO: task kworker/0:353:6034 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r5:00001000 r4:dfd83000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:8577c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8577c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca01e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f2c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8577c800 r7:00000000 r6:83018000 r5:00001000 r4:7f11d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d478c r4:857d4400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d478c r4:85512480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577c800 r8:855124ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85512480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512480 r8:8027ecf4 r7:ec9b5e60 r6:845bac00 r5:8577c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca01fb0 to 0xeca01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8522f400 INFO: task kworker/0:354:6036 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a9431000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:355:6038 blocked for more than 469 seconds. r10:829189c0 r9:eca09d84 r8:00000002 r7:60000013 r6:eca09d8c r5:8577ec00 r5:8577ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85512580 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:356:6040 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:356 state:D stack:0 pid:6040 tgid:6040 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca11d84 r8:00000002 r7:60000113 r6:eca11d8c r5:85639800 r4:85639800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85639800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca11e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85639800 r7:00000000 r6:83018000 r5:00001000 r4:7f17f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba77000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d4f8c r4:857d4c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d4f8c r4:85512500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85639800 r8:8551252c r7:82804d40 r6:dddced40 r5:dddced60 r4:85512500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeca11fb0 to 0xeca11ff8) INFO: task kworker/0:356:6040 is blocked on a mutex likely owned by task kworker/1:290:3848. r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/0:357:6042 blocked for more than 470 seconds. r5:85780000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca19e08 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:857d538c r4:85512600 r4:85512600 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:357:6042 is blocked on a mutex likely owned by task kworker/1:290:3848. [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a99ac000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:358:6044 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:358 state:D stack:0 pid:6044 tgid:6044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca21d84 r8:00000002 r7:60000013 r6:eca21d8c r5:85781800 r4:85781800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85781800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca21e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f7c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85781800 r7:00000000 r6:83018000 r5:00001000 r4:7f183000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe06cdd20 to 0xe06cdd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eca29d84 r8:00000002 r7:60000113 r6:eca29d8c r5:85780c00 r5:85780c00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8522f800 INFO: task kworker/0:359:6046 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a9e74000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:360:6048 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:360 state:D stack:0 pid:6048 tgid:6048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca31d84 r8:00000002 r7:60000013 r6:eca31d8c r5:85782400 r4:85782400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85782400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca31e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f8c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85782400 r7:00000000 r6:83018000 r5:00001000 r4:7f187000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdb1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d5f8c r4:857d5c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d5f8c r4:85512780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85782400 r8:855127ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85512780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512780 r8:8027ecf4 r7:ec9b5e60 r6:845baf00 r5:85782400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca31fb0 to 0xeca31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred dd20: a9fc8000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/0:361:6051 blocked for more than 470 seconds. r5:85783000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca3de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fb00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85783000 r7:00000000 r6:83018000 r5:00001000 r4:7f189000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdd3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d638c r4:857d6000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d638c r4:85512800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85783000 r8:8551282c r7:82804d40 r6:dddced40 r5:dddced60 r4:85512800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512800 r8:8027ecf4 r7:ec9b5e60 r6:845baf80 r5:85783000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca3dfb0 to 0xeca3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8522f9c0 INFO: task kworker/0:361:6051 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: a9fc8000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:00000000 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:362:6052 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:362 state:D stack:0 pid:6052 tgid:6052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca41d84 r8:00000002 r7:60000113 r6:eca41d8c r5:85783c00 r4:85783c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85783c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca41e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fc80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85783c00 r7:00000000 r6:83018000 r5:00001000 r4:7f18b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec609000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85783c00 r8:855128ac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/0:363:6055 blocked for more than 470 seconds. r5:85784800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca4de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85508900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85784800 r7:00000000 r6:83018000 r5:00001000 r4:7f18f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec653000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d6f8c r4:857d6c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d6f8c r4:85512900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85784800 r8:8551292c r7:82804d40 r6:dddced40 r5:dddced60 r4:85512900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512900 r8:8027ecf4 r7:ec9b5e60 r6:85471080 r5:85784800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca4dfb0 to 0xeca4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85508780 INFO: task kworker/0:363:6055 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) r5:800f0113 r4:80239bb0 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85785400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85512980 Exception stack(0xeca51fb0 to 0xeca51ff8) INFO: task kworker/0:364:6057 is blocked on a mutex likely owned by task kworker/1:290:3848. r5:800f0113 r4:80239bb0 r4:e06cddc0 r4:00000000 r5:00001000 r4:dfd83000 r4:85004e00 r4:8501e100 r5:85786c00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca55e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85786c00 r7:00000000 r6:83018000 r5:00001000 r4:7f197000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7f3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d7f8c r4:857d7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d7f8c r4:85512a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85786c00 r8:85512a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85512a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512a00 r8:8027ecf4 r7:eca51e60 r6:85471180 r5:85786c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca55fb0 to 0xeca55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85508c80 INFO: task kworker/0:365:6058 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: aab58000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:366:6060 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:366 state:D stack:0 pid:6060 tgid:6060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca5dd84 r8:00000002 r7:60000113 r6:eca5dd8c r5:8577e000 r4:8577e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8577e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca5de08 r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ec6f9000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85512a80 r8:8027ecf4 r7:eca55e60 r6:85471200 r5:8577e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca5dfb0 to 0xeca5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8552d080 INFO: task kworker/0:366:6060 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ab022000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 INFO: task kworker/0:367:6062 blocked for more than 470 seconds. r5:85786000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca65e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:857d7b8c r4:85512b00 r10:00000000 r9:85512b00 r8:8027ecf4 r7:eca55e60 r6:85471280 r5:85786000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ab022000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:368:6064 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:368 state:D stack:0 pid:6064 tgid:6064 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca6dd84 r8:00000002 r7:60000113 r6:eca6dd8c r5:85788c00 r4:85788c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85788c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca6de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854626c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85788c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1a1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec849000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d938c r4:857d9000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d938c r4:85512b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85788c00 r8:85512bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85512b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512b80 r8:8027ecf4 r7:eca55e60 r6:85471300 r5:85788c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:00000000 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:8578a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca75e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462200 r7:dddced40 r6:83018000 r5:857d838c r4:85512c00 r4:00000001 INFO: task kworker/0:369:6066 is blocked on a mutex likely owned by task kworker/1:290:3848. r4:e06cddc0 r5:84ff7f8c r4:84ff7c00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:370:6069 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:370 state:D stack:0 pid:6069 tgid:6069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca81d84 r8:00000002 r7:60000013 r6:eca81d8c r5:85789800 r4:85789800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85789800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca81e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85789800 r7:00000000 r6:83018000 r5:00001000 r4:7f19b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec82f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d878c r4:857d8400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d878c r4:85512c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85789800 r8:85512cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85512c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512c80 r8:8027ecf4 r7:eca6de60 r6:85471400 r5:85789800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca81fb0 to 0xeca81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854621c0 INFO: task kworker/0:370:6069 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 INFO: task kworker/0:371:6070 blocked for more than 470 seconds. r4:850aec00 r5:850aec00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca45e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeca45fb0 to 0xeca45ff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ab61f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:850ad400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r9:83018005 r8:850ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f19f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec841000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d8f8c r4:857d8c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d8f8c r4:85512e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ad400 r8:85512e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85512e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512e00 r8:8027ecf4 r7:eca6de60 r6:85512e80 r5:850ad400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca7dfb0 to 0xeca7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85462500 INFO: task kworker/0:372:6074 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ab9ad000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850ae000 r5:850ae000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec939e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f1a5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca91000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d9b8c r4:857d9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d9b8c r4:85512f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ae000 r8:85512f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85512f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512f00 r8:8027ecf4 r7:eca6de60 r6:85512f80 r5:850ae000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec939fb0 to 0xec939ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06cdfb0 to 0xe06cdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:374:6077 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:374 state:D stack:0 pid:6077 tgid:6077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca89d84 r8:00000002 r7:60000013 r6:eca89d8c r5:850abc00 r4:850abc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850abc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca89e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854628c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f1a3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:84ec0000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca8de08 r5:00001000 r4:ecaa1000 r7:dddced40 r6:83018000 r5:857d9f8c r4:84505100 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85462940 INFO: task kworker/0:375:6079 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: abd18000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/0:376:6082 blocked for more than 470 seconds. r4:84ec2400 r5:84ec2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 800f0113 ffffffff r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84ec0c00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecab5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857da78c r4:857da400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857da78c r4:84505300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ec0c00 r8:8450532c r7:82804d40 r6:dddced40 r5:dddced60 r4:84505300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84505300 r8:8027ecf4 r7:ecaade60 r6:84505380 r5:84ec0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaa5fb0 to 0xecaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85462f40 INFO: task kworker/0:377:6084 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ac1b2000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:378:6086 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:378 state:D stack:0 pid:6086 tgid:6086 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca95d84 r8:00000002 r7:60000113 r6:eca95d8c r5:84ec3000 r4:84ec3000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ec3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:84ec3000 r7:00000000 r6:83018000 r5:00001000 r4:7f1b1000 r7:dddced40 r6:83018000 r5:857daf8c r4:84505400 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 800f0113 ffffffff r4:e06cddc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:379:6088 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:379 state:D stack:0 pid:6088 tgid:6088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecabdd84 r8:00000002 r7:60000113 r6:ecabdd8c r5:84ec3c00 r4:84ec3c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018005 r8:84ec3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1af000 r10:61c88647 r9:84ec3c00 r8:8450552c r7:82804d40 r6:dddced40 r5:dddced60 r4:8510e440 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:84ff7f8c r4:84ff7c00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r5:84ec4800 r4:829189bc r4:00000000 r9:83018005 r8:84ec4800 r7:00000000 r6:83018000 r5:00001000 r4:7f1b3000 r10:61c88647 r9:84ec4800 r8:8450562c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84505600 r8:8027ecf4 r7:eca95e60 r6:84505680 r5:84ec4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecac9fb0 to 0xecac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510e280 INFO: task kworker/0:380:6090 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ac6fe000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:381:6092 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:381 state:D stack:0 pid:6092 tgid:6092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecad1d84 r8:00000002 r7:60000013 r6:ecad1d8c r5:84ec5400 r4:84ec5400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ec5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510edc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ec5400 r7:00000000 r6:83018000 r5:00001000 r4:7f1bf000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb0b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e4b8c r4:857e4800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857e4b8c r4:84505700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ec5400 r8:8450572c r7:82804d40 r6:dddced40 r5:dddced60 r4:84505700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84505700 r8:8027ecf4 r7:ecac9e60 r6:84505780 r5:84ec5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecad1fb0 to 0xecad1ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:382:6094 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:382 state:D stack:0 pid:6094 tgid:6094 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84ec6000 r5:84ec6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:84ec6000 r7:00000000 r6:83018000 r5:00001000 r4:7f1b5000 r10:61c88647 r9:84ec6000 r8:8450582c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r5:84ff7f8c r4:84ff7c00 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:383:6096 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:383 state:D stack:0 pid:6096 tgid:6096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecae5d84 r8:00000002 r7:60000013 r6:ecae5d8c r5:84ec6c00 r4:84ec6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ec6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84ec1800 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf1e08 r9:83018005 r8:84ec1800 r7:00000000 r6:83018000 r5:00001000 r4:7f1b9000 r5:857dbf8c r4:857dbc00 r10:00000000 r9:84505a00 r8:8027ecf4 r7:ecad1e60 r6:84505a80 r5:84ec1800 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ad00b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:385:6101 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:385 state:D stack:0 pid:6101 tgid:6101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e4875d84 r8:00000002 r7:60000113 r6:e4875d8c r5:850aa400 r4:850aa400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850aa400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4875e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510eac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84505b00 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 r5:84ff7f8c r4:84ff7c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84d28000 r5:84d28000 r4:829189bc r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:8510ebc0 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:387:6105 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:387 state:D stack:0 pid:6105 tgid:6105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb09d84 r8:00000002 r7:60000013 r6:ecb09d8c r5:84d28c00 r4:84d28c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d28c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb09e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85207d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d28c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1c1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb11000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e4f8c r4:857e4c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857e4f8c r4:84505d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d28c00 r8:84505d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84505d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84505d00 r8:8027ecf4 r7:ecad1e60 r6:84505d80 r5:84d28c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb09fb0 to 0xecb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852076c0 INFO: task kworker/0:387:6105 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:85004e00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:388 state:D stack:0 pid:6106 tgid:6106 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb15d84 r8:00000002 r7:60000113 r6:ecb15d8c r5:84d29800 r4:84d29800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d29800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb15e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543d140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d29800 r7:00000000 r6:83018000 r5:00001000 r4:7f1c5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb25000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e578c r4:857e5400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857e578c r4:84505e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d29800 r8:84505e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84505e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84505e00 r8:8027ecf4 r7:ecb09e60 r6:84505e80 r5:84d29800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb15fb0 to 0xecb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8510eec0 INFO: task kworker/0:388:6106 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:389:6109 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:389 state:D stack:0 pid:6109 tgid:6109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb1dd84 r8:00000002 r7:60000013 r6:ecb1dd8c r5:84d2a400 r4:84d2a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d2a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb1de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543d040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d2a400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb1f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e538c r4:857e5000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857e538c r4:84505f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d2a400 r8:84505f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84505f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84505f00 r8:8027ecf4 r7:ecb15e60 r6:84505f80 r5:84d2a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb1dfb0 to 0xecb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8543d280 INFO: task kworker/0:389:6109 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ada0c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:390:6110 blocked for more than 470 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:84d2b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb31e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543d300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb33000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e5b8c r4:857e5800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857e5b8c r4:84048f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d2b000 r8:84048fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84048f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84048f80 r8:8027ecf4 r7:ecb15e60 r6:8543b000 r5:84d2b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb31fb0 to 0xecb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8543d100 INFO: task kworker/0:390:6110 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ada0c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:391 state:D stack:0 pid:6113 tgid:6113 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84d2d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb45e08 r4:00000000 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:84d2d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1cb000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e5f8c r4:857e5c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857e5f8c r4:8543b080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d2d400 r8:8543b0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8543b080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b080 r8:8027ecf4 r7:ecb31e60 r6:8543b100 r5:84d2d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb45fb0 to 0xecb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8543d2c0 INFO: task kworker/0:391:6113 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ade3c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:392:6115 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:392 state:D stack:0 pid:6115 tgid:6115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec871d84 r8:00000002 r7:60000113 r6:ec871d8c r5:84d2c800 r4:84d2c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d2c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec871e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543d780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d2c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb11000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e638c r4:857e6000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857e638c r4:8543b180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d2c800 r8:8543b1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8543b180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b180 r8:8027ecf4 r7:ecb45e60 r6:8543b200 r5:84d2c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec871fb0 to 0xec871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8543d4c0 INFO: task kworker/0:392:6115 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ade3c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:393:6117 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:393 state:D stack:0 pid:6117 tgid:6117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec875d84 r8:00000002 r7:60000113 r6:ec875d8c r5:84d2ec00 r4:84d2ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d2ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec875e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543da80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb307000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e678c r4:857e6400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857e678c r4:8543b280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d2ec00 r8:8543b2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8543b280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b280 r8:8027ecf4 r7:ec871e60 r6:8543b300 r5:84d2ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec875fb0 to 0xec875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8543d7c0 INFO: task kworker/0:393:6117 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ae352000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:394:6119 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:394 state:D stack:0 pid:6119 tgid:6119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec8c9d84 r8:00000002 r7:60000013 r6:ec8c9d8c r5:85758000 r4:85758000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85758000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543dc80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85758000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e6b8c r4:857e6800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857e6b8c r4:8543b380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85758000 r8:8543b3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8543b380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b380 r8:8027ecf4 r7:ec875e60 r6:8543b400 r5:85758000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c9fb0 to 0xec8c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8543db00 INFO: task kworker/0:394:6119 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ae352000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ff7f8c r4:84ff7c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85759800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8543b480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b480 r8:8027ecf4 r7:ec8c9e60 r6:8543b500 r5:85759800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8cdfb0 to 0xec8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8543d4c0 INFO: task kworker/0:395:6121 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ae56f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:396:6123 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:396 state:D stack:0 pid:6123 tgid:6123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec919d84 r8:00000002 r7:60000013 r6:ec919d8c r5:85758c00 r4:85758c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85758c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec919e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854450c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85758c00 r7:00000000 r6:83018000 r5:00001000 r4:7f123000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e738c r4:857e7000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857e738c r4:8543b580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85758c00 r8:8543b5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8543b580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b580 r8:8027ecf4 r7:ec8cde60 r6:8543b600 r5:85758c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec919fb0 to 0xec919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8543dbc0 INFO: task kworker/0:396:6123 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ae56f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:397:6124 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:397 state:D stack:0 pid:6124 tgid:6124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec93dd84 r8:00000002 r7:60000013 r6:ec93dd8c r5:8575b000 r4:8575b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8575b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec93de08 r4:00000000 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85445280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8575b000 r7:00000000 r6:83018000 r5:00001000 r4:7f125000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc8b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e778c r4:857e7400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857e778c r4:8543b680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8575b000 r8:8543b6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8543b680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b680 r8:8027ecf4 r7:ec919e60 r6:8543b700 r5:8575b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec93dfb0 to 0xec93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8543dbc0 INFO: task kworker/0:397:6124 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: aede0000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:8575c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec979e08 r9:83018005 r8:8575c800 r7:00000000 r6:83018000 r5:00001000 r4:7f127000 r10:61c88647 r9:8575c800 r8:8543b7ac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r4:00000000 r5:84ff7f8c r4:84ff7c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:399:6130 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:399 state:D stack:0 pid:6130 tgid:6130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec955d84 r8:00000002 r7:60000013 r6:ec955d8c r5:8575d400 r4:8575d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8575d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec955e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85445b00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8575d400 r7:00000000 r6:83018000 r5:00001000 r4:7f12f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec749000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ec78c r4:857ec400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857ec78c r4:8543b880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8575d400 r8:8543b8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8543b880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b880 r8:8027ecf4 r7:ec979e60 r6:8543b900 r5:8575d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec955fb0 to 0xec955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85445440 INFO: task kworker/0:399:6130 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: aef36000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r5:84ff7f8c r4:84ff7c00 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:400:6133 blocked for more than 470 seconds. task:kworker/0:400 state:D stack:0 pid:6133 tgid:6133 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8575bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85445740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8575bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f12b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec72d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e7f8c r4:857e7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857e7f8c r4:8543b980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8575bc00 r8:8543b9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8543b980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543b980 r8:8027ecf4 r7:ec955e60 r6:8543ba00 r5:8575bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb51fb0 to 0xecb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85445600 INFO: task kworker/0:400:6133 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: af2f2000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:401:6135 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:401 state:D stack:0 pid:6135 tgid:6135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb55d84 r8:00000002 r7:60000113 r6:ecb55d8c r5:8575ec00 r4:8575ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8575ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb55e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85445900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8575ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f12d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec739000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ec38c r4:857ec000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857ec38c r4:8543ba80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8575ec00 r8:8543baac r7:82804d40 r6:dddced40 r5:dddced60 r4:8543ba80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543ba80 r8:8027ecf4 r7:ec955e60 r6:8543bb00 r5:8575ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb55fb0 to 0xecb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854458c0 INFO: task kworker/0:401:6135 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: af87b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:402:6137 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:402 state:D stack:0 pid:6137 tgid:6137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb59d84 r8:00000002 r7:60000013 r6:ecb59d8c r5:84d2bc00 r4:84d2bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d2bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb59e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85445d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d2bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f131000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec755000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ecb8c r4:857ec800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857ecb8c r4:8543bb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d2bc00 r8:8543bbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8543bb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543bb80 r8:8027ecf4 r7:ec955e60 r6:8543bc00 r5:84d2bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb59fb0 to 0xecb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85445ac0 INFO: task kworker/0:402:6137 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: af87b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:403:6139 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:403 state:D stack:0 pid:6139 tgid:6139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb5dd84 r8:00000002 r7:60000013 r6:ecb5dd8c r5:8575e000 r4:8575e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8575e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb5de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84501040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8575e000 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec78f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ed38c r4:857ed000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857ed38c r4:8543bc80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8575e000 r8:8543bcac r7:82804d40 r6:dddced40 r5:dddced60 r4:8543bc80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543bc80 r8:8027ecf4 r7:ecb59e60 r6:8543bd00 r5:8575e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb5dfb0 to 0xecb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85445cc0 INFO: task kworker/0:403:6139 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: afc07000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:404:6142 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:404 state:D stack:0 pid:6142 tgid:6142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb65d84 r8:00000002 r7:60000013 r6:ecb65d8c r5:85191800 r4:85191800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85191800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb65e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543ddc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85191800 r7:00000000 r6:83018000 r5:00001000 r4:7f139000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec773000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ecf8c r4:857ecc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857ecf8c r4:8543bd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85191800 r8:8543bdac r7:82804d40 r6:dddced40 r5:dddced60 r4:8543bd80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543bd80 r8:8027ecf4 r7:ecb5de60 r6:8543be00 r5:85191800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb65fb0 to 0xecb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85445500 INFO: task kworker/0:404:6142 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: afc07000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:405:6144 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:405 state:D stack:0 pid:6144 tgid:6144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb61d84 r8:00000002 r7:60000013 r6:ecb61d8c r5:85190000 r4:85190000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85190000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb61e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84501500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85190000 r7:00000000 r6:83018000 r5:00001000 r4:7f141000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec879000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857edf8c r4:857edc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857edf8c r4:8543be80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85190000 r8:8543beac r7:82804d40 r6:dddced40 r5:dddced60 r4:8543be80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543be80 r8:8027ecf4 r7:ecb5de60 r6:8543bf00 r5:85190000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb61fb0 to 0xecb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84501000 INFO: task kworker/0:405:6144 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: afd2c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:406:6145 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:406 state:D stack:0 pid:6145 tgid:6145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb69d84 r8:00000002 r7:60000113 r6:ecb69d8c r5:85192400 r4:85192400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85192400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb69e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84501100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85192400 r7:00000000 r6:83018000 r5:00001000 r4:7f13d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7a9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ed78c r4:857ed400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857ed78c r4:8543bf80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85192400 r8:8543bfac r7:82804d40 r6:dddced40 r5:dddced60 r4:8543bf80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8543bf80 r8:8027ecf4 r7:ecb61e60 r6:85447000 r5:85192400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb69fb0 to 0xecb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84501000 INFO: task kworker/0:406:6145 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: affba000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:407:6148 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:407 state:D stack:0 pid:6148 tgid:6148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb29d84 r8:00000002 r7:60000013 r6:ecb29d8c r5:85193000 r4:85193000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85193000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb29e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84501400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85193000 r7:00000000 r6:83018000 r5:00001000 r4:7f13f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7c9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857edb8c r4:857ed800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857edb8c r4:85447080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85193000 r8:854470ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85447080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85447080 r8:8027ecf4 r7:ecb61e60 r6:85447100 r5:85193000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb29fb0 to 0xecb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845013c0 INFO: task kworker/0:407:6148 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b019b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:408:6150 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:408 state:D stack:0 pid:6150 tgid:6150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb6dd84 r8:00000002 r7:60000113 r6:ecb6dd8c r5:85193c00 r4:85193c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85193c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb6de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845019c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85193c00 r7:00000000 r6:83018000 r5:00001000 r4:7f147000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857eeb8c r4:857ee800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857eeb8c r4:85447180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85193c00 r8:854471ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85447180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85447180 r8:8027ecf4 r7:ecb61e60 r6:85447200 r5:85193c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb6dfb0 to 0xecb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84501480 INFO: task kworker/0:408:6150 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b046f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:409:6153 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:409 state:D stack:0 pid:6153 tgid:6153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb75d84 r8:00000002 r7:60000113 r6:ecb75d8c r5:85194800 r4:85194800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85194800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb75e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84501680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85194800 r7:00000000 r6:83018000 r5:00001000 r4:7f143000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8b7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ee38c r4:857ee000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857ee38c r4:85447280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85194800 r8:854472ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85447280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85447280 r8:8027ecf4 r7:ecb6de60 r6:85447300 r5:85194800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb75fb0 to 0xecb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845015c0 INFO: task kworker/0:409:6153 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b046f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:410:6154 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:410 state:D stack:0 pid:6154 tgid:6154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb41d84 r8:00000002 r7:60000113 r6:ecb41d8c r5:85195400 r4:85195400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85195400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb41e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84501800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85195400 r7:00000000 r6:83018000 r5:00001000 r4:7f145000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8c3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ee78c r4:857ee400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857ee78c r4:85447380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85195400 r8:854473ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85447380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85447380 r8:8027ecf4 r7:ecb6de60 r6:85447400 r5:85195400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb41fb0 to 0xecb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845015c0 INFO: task kworker/0:410:6154 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b06e3000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:411:6156 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:411 state:D stack:0 pid:6156 tgid:6156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb7dd84 r8:00000002 r7:60000013 r6:ecb7dd8c r5:85196c00 r4:85196c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85196c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb7de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85813040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85196c00 r7:00000000 r6:83018000 r5:00001000 r4:7f157000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec921000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ef78c r4:857ef400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857ef78c r4:85447480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85196c00 r8:854474ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85447480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85447480 r8:8027ecf4 r7:ecb6de60 r6:85447500 r5:85196c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb7dfb0 to 0xecb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84501980 INFO: task kworker/0:411:6156 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b06e3000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:412:6158 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:412 state:D stack:0 pid:6158 tgid:6158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb81d84 r8:00000002 r7:60000013 r6:ecb81d8c r5:85196000 r4:85196000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85196000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb81e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84501c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85196000 r7:00000000 r6:83018000 r5:00001000 r4:7f149000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8ef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857eef8c r4:857eec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857eef8c r4:85447580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85196000 r8:854475ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85447580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85447580 r8:8027ecf4 r7:ecb7de60 r6:85447600 r5:85196000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb81fb0 to 0xecb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84501b00 INFO: task kworker/0:412:6158 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b0969000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:413:6161 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:413 state:D stack:0 pid:6161 tgid:6161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb89d84 r8:00000002 r7:60000113 r6:ecb89d8c r5:8575a400 r4:8575a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8575a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb89e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85445e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8575a400 r7:00000000 r6:83018000 r5:00001000 r4:7f153000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec909000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ef38c r4:857ef000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857ef38c r4:85447680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8575a400 r8:854476ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85447680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85447680 r8:8027ecf4 r7:ecb7de60 r6:85447700 r5:8575a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb89fb0 to 0xecb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84501ec0 INFO: task kworker/0:413:6161 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b0cbc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:6163 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:6163 tgid:6163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb8dd84 r8:00000002 r7:60000113 r6:ecb8dd8c r5:85190c00 r4:85190c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85190c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb8de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858132c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85190c00 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec929000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857efb8c r4:857ef800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857efb8c r4:85447780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85190c00 r8:854477ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85447780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85447780 r8:8027ecf4 r7:ecb7de60 r6:85447800 r5:85190c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb8dfb0 to 0xecb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85813000 INFO: task kworker/0:414:6163 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b1077000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:415:6165 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:415 state:D stack:0 pid:6165 tgid:6165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb85d84 r8:00000002 r7:60000113 r6:ecb85d8c r5:85860000 r4:85860000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85860000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb85e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85813640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85860000 r7:00000000 r6:83018000 r5:00001000 r4:7f15d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fc38c r4:857fc000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857fc38c r4:85447880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85860000 r8:854478ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85447880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85447880 r8:8027ecf4 r7:ecb8de60 r6:85447900 r5:85860000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb85fb0 to 0xecb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85813280 INFO: task kworker/0:415:6165 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b1173000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:416:6166 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:416 state:D stack:0 pid:6166 tgid:6166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb91d84 r8:00000002 r7:60000113 r6:ecb91d8c r5:85860c00 r4:85860c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85860c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb91e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858133c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85860c00 r7:00000000 r6:83018000 r5:00001000 r4:7f15b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec93f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857eff8c r4:857efc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857eff8c r4:85447980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85860c00 r8:854479ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85447980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85447980 r8:8027ecf4 r7:ecb85e60 r6:85447a00 r5:85860c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb91fb0 to 0xecb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85813280 INFO: task kworker/0:416:6166 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b1173000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:417:6169 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:417 state:D stack:0 pid:6169 tgid:6169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb79d84 r8:00000002 r7:60000113 r6:ecb79d8c r5:85861800 r4:85861800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85861800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb79e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858137c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85861800 r7:00000000 r6:83018000 r5:00001000 r4:7f15f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec963000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fc78c r4:857fc400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857fc78c r4:85447a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85861800 r8:85447aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85447a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85447a80 r8:8027ecf4 r7:ecb85e60 r6:85447b00 r5:85861800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb79fb0 to 0xecb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85813600 INFO: task kworker/0:417:6169 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b146e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:418:6172 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:418 state:D stack:0 pid:6172 tgid:6172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb99d84 r8:00000002 r7:60000113 r6:ecb99d8c r5:85862400 r4:85862400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85862400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb99e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858138c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85862400 r7:00000000 r6:83018000 r5:00001000 r4:7f161000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec96b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fcb8c r4:857fc800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857fcb8c r4:85447b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85862400 r8:85447bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85447b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85447b80 r8:8027ecf4 r7:ecb79e60 r6:85447c00 r5:85862400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb99fb0 to 0xecb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85813700 INFO: task kworker/0:418:6172 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b18f0000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:419:6173 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:419 state:D stack:0 pid:6173 tgid:6173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb9dd84 r8:00000002 r7:60000113 r6:ecb9dd8c r5:85863000 r4:85863000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85863000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb9de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85813bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85863000 r7:00000000 r6:83018000 r5:00001000 r4:7f165000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec993000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fd38c r4:857fd000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857fd38c r4:85447c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85863000 r8:85447cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85447c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85447c80 r8:8027ecf4 r7:ecb99e60 r6:85447d00 r5:85863000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb9dfb0 to 0xecb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85813840 INFO: task kworker/0:419:6173 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b1aac000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:420:6175 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:420 state:D stack:0 pid:6175 tgid:6175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecba1d84 r8:00000002 r7:60000013 r6:ecba1d8c r5:85863c00 r4:85863c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85863c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85813a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85863c00 r7:00000000 r6:83018000 r5:00001000 r4:7f163000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec987000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fcf8c r4:857fcc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857fcf8c r4:85447d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85863c00 r8:85447dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85447d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85447d80 r8:8027ecf4 r7:ecb9de60 r6:85447e00 r5:85863c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecba1fb0 to 0xecba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85813980 INFO: task kworker/0:420:6175 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b1e58000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:421:6177 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:421 state:D stack:0 pid:6177 tgid:6177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb95d84 r8:00000002 r7:60000113 r6:ecb95d8c r5:85864800 r4:85864800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85864800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb95e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84501f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85864800 r7:00000000 r6:83018000 r5:00001000 r4:7f169000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9af000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fdb8c r4:857fd800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857fdb8c r4:85447e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85864800 r8:85447eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85447e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85447e80 r8:8027ecf4 r7:ecb9de60 r6:85447f00 r5:85864800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb95fb0 to 0xecb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85813980 INFO: task kworker/0:421:6177 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b21b8000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:6178 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:6178 tgid:6178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecba5d84 r8:00000002 r7:60000113 r6:ecba5d8c r5:85865400 r4:85865400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85865400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85813d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85865400 r7:00000000 r6:83018000 r5:00001000 r4:7f167000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9a7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fd78c r4:857fd400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857fd78c r4:85447f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85865400 r8:85447fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85447f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85447f80 r8:8027ecf4 r7:ecb95e60 r6:85816000 r5:85865400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecba5fb0 to 0xecba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85813ec0 INFO: task kworker/0:422:6178 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b21b8000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:423:6182 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:423 state:D stack:0 pid:6182 tgid:6182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbadd84 r8:00000002 r7:60000113 r6:ecbadd8c r5:85866000 r4:85866000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85866000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbade08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85823040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85866000 r7:00000000 r6:83018000 r5:00001000 r4:7f16b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9cd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fdf8c r4:857fdc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857fdf8c r4:85816080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85866000 r8:858160ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85816080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816080 r8:8027ecf4 r7:ecb95e60 r6:85816100 r5:85866000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbadfb0 to 0xecbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85823080 INFO: task kworker/0:423:6182 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b24ac000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:424:6183 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:424 state:D stack:0 pid:6183 tgid:6183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbb1d84 r8:00000002 r7:60000013 r6:ecbb1d8c r5:85866c00 r4:85866c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85866c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbb1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85823240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85866c00 r7:00000000 r6:83018000 r5:00001000 r4:7f16f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fe38c r4:857fe000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857fe38c r4:85816180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85866c00 r8:858161ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85816180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816180 r8:8027ecf4 r7:ecbade60 r6:85816200 r5:85866c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb1fb0 to 0xecbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85823080 INFO: task kworker/0:424:6183 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b2908000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:425:6185 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:425 state:D stack:0 pid:6185 tgid:6185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbb5d84 r8:00000002 r7:60000013 r6:ecbb5d8c r5:85868000 r4:85868000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85868000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbb5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85823300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85868000 r7:00000000 r6:83018000 r5:00001000 r4:7f171000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbb9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fe78c r4:857fe400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857fe78c r4:85816280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85868000 r8:858162ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85816280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816280 r8:8027ecf4 r7:ecbb1e60 r6:85816300 r5:85868000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb5fb0 to 0xecbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85823200 INFO: task kworker/0:425:6185 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b2908000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:426:6187 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:426 state:D stack:0 pid:6187 tgid:6187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbbdd84 r8:00000002 r7:60000013 r6:ecbbdd8c r5:85868c00 r4:85868c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85868c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbbde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85823580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85868c00 r7:00000000 r6:83018000 r5:00001000 r4:7f173000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbc7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857feb8c r4:857fe800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857feb8c r4:85816380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85868c00 r8:858163ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85816380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816380 r8:8027ecf4 r7:ecbb5e60 r6:85816400 r5:85868c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbbdfb0 to 0xecbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85823340 INFO: task kworker/0:426:6187 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b2e0d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:427:6189 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:427 state:D stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecba9d84 r8:00000002 r7:60000013 r6:ecba9d8c r5:8586a400 r4:8586a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8586a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85823740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8586a400 r7:00000000 r6:83018000 r5:00001000 r4:7f175000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbcd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fef8c r4:857fec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857fef8c r4:85816480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8586a400 r8:858164ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85816480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816480 r8:8027ecf4 r7:ecbbde60 r6:85816500 r5:8586a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecba9fb0 to 0xecba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85823540 INFO: task kworker/0:427:6189 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b2e0d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:428:6191 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:428 state:D stack:0 pid:6191 tgid:6191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbd5d84 r8:00000002 r7:60000113 r6:ecbd5d8c r5:85869800 r4:85869800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85869800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85823940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85869800 r7:00000000 r6:83018000 r5:00001000 r4:7f177000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbd7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ff38c r4:857ff000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857ff38c r4:85816580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85869800 r8:858165ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85816580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816580 r8:8027ecf4 r7:ecba9e60 r6:85816600 r5:85869800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd5fb0 to 0xecbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85823700 INFO: task kworker/0:428:6191 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b3108000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:429:6193 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:429 state:D stack:0 pid:6193 tgid:6193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbc5d84 r8:00000002 r7:60000013 r6:ecbc5d8c r5:8586bc00 r4:8586bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8586bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85823a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8586bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f1cd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbdd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ff78c r4:857ff400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857ff78c r4:85816680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8586bc00 r8:858166ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85816680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816680 r8:8027ecf4 r7:ecbd5e60 r6:85816700 r5:8586bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbc5fb0 to 0xecbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85823900 INFO: task kworker/0:429:6193 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b3108000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:430:6195 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:430 state:D stack:0 pid:6195 tgid:6195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbe1d84 r8:00000002 r7:60000013 r6:ecbe1d8c r5:8586c800 r4:8586c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8586c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85823ec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8586c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1d3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580838c r4:85808000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8580838c r4:85816780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8586c800 r8:858167ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85816780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816780 r8:8027ecf4 r7:ecbc5e60 r6:85816800 r5:8586c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe1fb0 to 0xecbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858239c0 INFO: task kworker/0:430:6195 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b3314000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:6197 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:431 state:D stack:0 pid:6197 tgid:6197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbe9d84 r8:00000002 r7:60000113 r6:ecbe9d8c r5:8586d400 r4:8586d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8586d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85823c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8586d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1cf000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbeb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ffb8c r4:857ff800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857ffb8c r4:85816880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8586d400 r8:858168ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85816880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816880 r8:8027ecf4 r7:ecbe1e60 r6:85816900 r5:8586d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe9fb0 to 0xecbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85823d40 INFO: task kworker/0:431:6197 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b3314000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:432:6199 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:432 state:D stack:0 pid:6199 tgid:6199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbf5d84 r8:00000002 r7:60000013 r6:ecbf5d8c r5:8586e000 r4:8586e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8586e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85823dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8586e000 r7:00000000 r6:83018000 r5:00001000 r4:7f1d1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbf1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fff8c r4:857ffc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857fff8c r4:85816980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8586e000 r8:858169ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85816980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816980 r8:8027ecf4 r7:ecbe1e60 r6:85816a00 r5:8586e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf5fb0 to 0xecbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85823d80 INFO: task kworker/0:432:6199 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b3894000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:433:6202 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:433 state:D stack:0 pid:6202 tgid:6202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc09d84 r8:00000002 r7:60000113 r6:ecc09d8c r5:8586ec00 r4:8586ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8586ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc09e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544be40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8586ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f1d5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc05000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580878c r4:85808400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8580878c r4:85816a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8586ec00 r8:85816aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85816a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816a80 r8:8027ecf4 r7:ecbe1e60 r6:85816b00 r5:8586ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc09fb0 to 0xecc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85813e40 INFO: task kworker/0:433:6202 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b39f0000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:6204 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:434 state:D stack:0 pid:6204 tgid:6204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc11d84 r8:00000002 r7:60000013 r6:ecc11d8c r5:8586b000 r4:8586b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8586b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc11e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca0c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8586b000 r7:00000000 r6:83018000 r5:00001000 r4:7f1d7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc13000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85808b8c r4:85808800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85808b8c r4:85816b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8586b000 r8:85816bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85816b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816b80 r8:8027ecf4 r7:ecc09e60 r6:85816c00 r5:8586b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc11fb0 to 0xecc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85823f80 INFO: task kworker/0:434:6204 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b3dad000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:435:6205 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:435 state:D stack:0 pid:6205 tgid:6205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbfdd84 r8:00000002 r7:60000013 r6:ecbfdd8c r5:85870000 r4:85870000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85870000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbfde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85837100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85870000 r7:00000000 r6:83018000 r5:00001000 r4:7f1d9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc19000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85808f8c r4:85808c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85808f8c r4:85816c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85870000 r8:85816cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85816c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816c80 r8:8027ecf4 r7:ecc11e60 r6:85816d00 r5:85870000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbfdfb0 to 0xecbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85823f80 INFO: task kworker/0:435:6205 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b3fd4000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:436:6208 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:436 state:D stack:0 pid:6208 tgid:6208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc1dd84 r8:00000002 r7:60000113 r6:ecc1dd8c r5:85870c00 r4:85870c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85870c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc1de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858371c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85870c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1db000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc27000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580938c r4:85809000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8580938c r4:85816d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85870c00 r8:85816dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85816d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816d80 r8:8027ecf4 r7:ecbfde60 r6:85816e00 r5:85870c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc1dfb0 to 0xecc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858370c0 INFO: task kworker/0:436:6208 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b3fd4000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:437:6209 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:437 state:D stack:0 pid:6209 tgid:6209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc25d84 r8:00000002 r7:60000113 r6:ecc25d8c r5:85871800 r4:85871800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85871800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc25e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85837400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85871800 r7:00000000 r6:83018000 r5:00001000 r4:7f1dd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc2d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580978c r4:85809400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8580978c r4:85816e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85871800 r8:85816eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85816e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816e80 r8:8027ecf4 r7:ecc1de60 r6:85816f00 r5:85871800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc25fb0 to 0xecc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85837200 INFO: task kworker/0:437:6209 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b41fc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:438:6210 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:438 state:D stack:0 pid:6210 tgid:6210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc39d84 r8:00000002 r7:60000113 r6:ecc39d8c r5:85872400 r4:85872400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85872400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc39e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85837640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85872400 r7:00000000 r6:83018000 r5:00001000 r4:7f1df000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc3f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85809b8c r4:85809800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85809b8c r4:85816f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85872400 r8:85816fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85816f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85816f80 r8:8027ecf4 r7:ecc25e60 r6:8583d000 r5:85872400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc39fb0 to 0xecc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85837540 INFO: task kworker/0:438:6210 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b442c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:439:6213 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:439 state:D stack:0 pid:6213 tgid:6213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc31d84 r8:00000002 r7:60000013 r6:ecc31d8c r5:85873000 r4:85873000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85873000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc31e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858377c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85873000 r7:00000000 r6:83018000 r5:00001000 r4:7f1e1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc45000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85809f8c r4:85809c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85809f8c r4:8583d080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85873000 r8:8583d0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8583d080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583d080 r8:8027ecf4 r7:ecc39e60 r6:8583d100 r5:85873000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc31fb0 to 0xecc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85837600 INFO: task kworker/0:439:6213 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b4837000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:440:6215 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:440 state:D stack:0 pid:6215 tgid:6215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca25d84 r8:00000002 r7:60000113 r6:eca25d8c r5:8578ec00 r4:8578ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8578ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca25e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85837c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8578ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb67d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580a78c r4:8580a400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8580a78c r4:8583d180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8578ec00 r8:8583d1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8583d180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583d180 r8:8027ecf4 r7:ecc31e60 r6:85471480 r5:8578ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca25fb0 to 0xeca25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85837700 INFO: task kworker/0:440:6215 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b4837000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:441:6217 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:441 state:D stack:0 pid:6217 tgid:6217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc49d84 r8:00000002 r7:60000013 r6:ecc49d8c r5:8578d400 r4:8578d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8578d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc49e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85837e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8578d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580b38c r4:8580b000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8580b38c r4:8583d200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8578d400 r8:8583d22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8583d200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583d200 r8:8027ecf4 r7:eca25e60 r6:85471500 r5:8578d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc49fb0 to 0xecc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85837ac0 INFO: task kworker/0:441:6217 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b4b6c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:442:6220 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:442 state:D stack:0 pid:6220 tgid:6220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc3dd84 r8:00000002 r7:60000013 r6:ecc3dd8c r5:8578bc00 r4:8578bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8578bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc3de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85837cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8578bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb93f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580ab8c r4:8580a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8580ab8c r4:8583d280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8578bc00 r8:8583d2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8583d280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583d280 r8:8027ecf4 r7:ecc49e60 r6:85471580 r5:8578bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc3dfb0 to 0xecc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85837e40 INFO: task kworker/0:442:6220 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b4d9c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:443:6222 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:443 state:D stack:0 pid:6222 tgid:6222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc51d84 r8:00000002 r7:60000113 r6:ecc51d8c r5:8578c800 r4:8578c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8578c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc51e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85837e00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8578c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580af8c r4:8580ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8580af8c r4:8583d380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8578c800 r8:8583d3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8583d380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583d380 r8:8027ecf4 r7:ecc49e60 r6:85471600 r5:8578c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc51fb0 to 0xecc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85837f00 INFO: task kworker/0:443:6222 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b4d9c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:444:6225 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:444 state:D stack:0 pid:6225 tgid:6225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc5dd84 r8:00000002 r7:60000013 r6:ecc5dd8c r5:85788000 r4:85788000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85788000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc5de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858423c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85788000 r7:00000000 r6:83018000 r5:00001000 r4:7f17f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec647000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588838c r4:85888000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588838c r4:8583d300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85788000 r8:8583d32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8583d300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583d300 r8:8027ecf4 r7:ecc49e60 r6:85471680 r5:85788000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc5dfb0 to 0xecc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85843000 INFO: task kworker/0:444:6225 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b4f72000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:445:6226 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:445 state:D stack:0 pid:6226 tgid:6226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc61d84 r8:00000002 r7:60000113 r6:ecc61d8c r5:8578e000 r4:8578e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8578e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc61e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85842040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8578e000 r7:00000000 r6:83018000 r5:00001000 r4:7f11d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd8b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580b78c r4:8580b400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8580b78c r4:8583d400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8578e000 r8:8583d42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8583d400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583d400 r8:8027ecf4 r7:ecc5de60 r6:85471700 r5:8578e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc61fb0 to 0xecc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85842000 INFO: task kworker/0:445:6226 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b52bc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:446:6228 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:446 state:D stack:0 pid:6228 tgid:6228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc69d84 r8:00000002 r7:60000113 r6:ecc69d8c r5:8578b000 r4:8578b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8578b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc69e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85842180 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8578b000 r7:00000000 r6:83018000 r5:00001000 r4:7f17b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdc7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580bb8c r4:8580b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8580bb8c r4:8583d500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8578b000 r8:8583d52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8583d500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583d500 r8:8027ecf4 r7:ecc5de60 r6:85471780 r5:8578b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc69fb0 to 0xecc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85842280 INFO: task kworker/0:446:6228 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b5461000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:447:6230 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:447 state:D stack:0 pid:6230 tgid:6230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc71d84 r8:00000002 r7:60000113 r6:ecc71d8c r5:8577d400 r4:8577d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8577d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc71e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85842300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8577d400 r7:00000000 r6:83018000 r5:00001000 r4:7f17d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec617000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580bf8c r4:8580bc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8580bf8c r4:8583d480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577d400 r8:8583d4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8583d480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583d480 r8:8027ecf4 r7:ecc5de60 r6:85471800 r5:8577d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc71fb0 to 0xecc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85842140 INFO: task kworker/0:447:6230 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b5461000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:448:6233 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:448 state:D stack:0 pid:6233 tgid:6233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc7dd84 r8:00000002 r7:60000113 r6:ecc7dd8c r5:85790c00 r4:85790c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85790c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc7de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85842540 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85790c00 r7:00000000 r6:83018000 r5:00001000 r4:7f181000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec679000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588878c r4:85888400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588878c r4:8583d580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85790c00 r8:8583d5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8583d580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583d580 r8:8027ecf4 r7:ecc5de60 r6:85471880 r5:85790c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc7dfb0 to 0xecc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85842200 INFO: task kworker/0:448:6233 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b573c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:449:6234 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:449 state:D stack:0 pid:6234 tgid:6234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc81d84 r8:00000002 r7:60000113 r6:ecc81d8c r5:85791800 r4:85791800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85791800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc81e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85842740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85791800 r7:00000000 r6:83018000 r5:00001000 r4:7f185000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7f5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85888b8c r4:85888800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85888b8c r4:8583d600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85791800 r8:8583d62c r7:82804d40 r6:dddced40 r5:dddced60 r4:8583d600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583d600 r8:8027ecf4 r7:ecc7de60 r6:85471900 r5:85791800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc81fb0 to 0xecc81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85842680 INFO: task kworker/0:449:6234 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b573c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:450:6237 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:450 state:D stack:0 pid:6237 tgid:6237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca2dd84 r8:00000002 r7:60000113 r6:eca2dd8c r5:85792400 r4:85792400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85792400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca2de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85842900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85792400 r7:00000000 r6:83018000 r5:00001000 r4:7f187000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec82b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85888f8c r4:85888c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85888f8c r4:8583d680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85792400 r8:8583d6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8583d680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583d680 r8:8027ecf4 r7:ecc81e60 r6:85471980 r5:85792400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca2dfb0 to 0xeca2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85842700 INFO: task kworker/0:450:6237 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b5987000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:451:6239 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:451 state:D stack:0 pid:6239 tgid:6239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca35d84 r8:00000002 r7:60000113 r6:eca35d8c r5:85875400 r4:85875400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85875400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca35e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85842980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85875400 r7:00000000 r6:83018000 r5:00001000 r4:7f189000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec83b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588938c r4:85889000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588938c r4:8583d700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85875400 r8:8583d72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8583d700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583d700 r8:8027ecf4 r7:eca2de60 r6:8583d780 r5:85875400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca35fb0 to 0xeca35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858424c0 INFO: task kworker/0:451:6239 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b5cb0000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:452:6242 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:452 state:D stack:0 pid:6242 tgid:6242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc79d84 r8:00000002 r7:60000013 r6:ecc79d8c r5:85876000 r4:85876000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85876000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc79e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85842a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85876000 r7:00000000 r6:83018000 r5:00001000 r4:7f18b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec847000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588978c r4:85889400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588978c r4:8583d800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85876000 r8:8583d82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8583d800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583d800 r8:8027ecf4 r7:eca35e60 r6:8583d880 r5:85876000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc79fb0 to 0xecc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85842a40 INFO: task kworker/0:452:6242 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b5e0b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:453:6244 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:453 state:D stack:0 pid:6244 tgid:6244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc89d84 r8:00000002 r7:60000013 r6:ecc89d8c r5:85876c00 r4:85876c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85876c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc89e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85842e00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85876c00 r7:00000000 r6:83018000 r5:00001000 r4:7f18f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9c3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85889f8c r4:85889c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85889f8c r4:8583d900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85876c00 r8:8583d92c r7:82804d40 r6:dddced40 r5:dddced60 r4:8583d900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583d900 r8:8027ecf4 r7:ecc79e60 r6:8583d980 r5:85876c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc89fb0 to 0xecc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85842ac0 INFO: task kworker/0:453:6244 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b602d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:454:6246 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:454 state:D stack:0 pid:6246 tgid:6246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc8dd84 r8:00000002 r7:60000113 r6:ecc8dd8c r5:85873c00 r4:85873c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85873c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc8de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85842c80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85873c00 r7:00000000 r6:83018000 r5:00001000 r4:7f18d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec855000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85889b8c r4:85889800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85889b8c r4:8583da00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85873c00 r8:8583da2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8583da00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583da00 r8:8027ecf4 r7:ecc89e60 r6:8583da80 r5:85873c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc8dfb0 to 0xecc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85842bc0 INFO: task kworker/0:454:6246 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b60ab000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:455:6248 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:455 state:D stack:0 pid:6248 tgid:6248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc91d84 r8:00000002 r7:60000013 r6:ecc91d8c r5:85874800 r4:85874800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85874800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc91e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85837b40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85874800 r7:00000000 r6:83018000 r5:00001000 r4:7f191000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588a38c r4:8588a000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588a38c r4:8583db00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85874800 r8:8583db2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8583db00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583db00 r8:8027ecf4 r7:ecc89e60 r6:8583db80 r5:85874800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc91fb0 to 0xecc91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85837d40 INFO: task kworker/0:455:6248 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b62ee000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:456:6250 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:456 state:D stack:0 pid:6250 tgid:6250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc95d84 r8:00000002 r7:60000113 r6:ecc95d8c r5:85880000 r4:85880000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85880000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc95e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85900040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85880000 r7:00000000 r6:83018000 r5:00001000 r4:7f193000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9e5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588a78c r4:8588a400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588a78c r4:8583dc00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85880000 r8:8583dc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8583dc00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583dc00 r8:8027ecf4 r7:ecc91e60 r6:8583dc80 r5:85880000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc95fb0 to 0xecc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85900080 INFO: task kworker/0:456:6250 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b6562000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:457:6252 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:457 state:D stack:0 pid:6252 tgid:6252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc99d84 r8:00000002 r7:60000113 r6:ecc99d8c r5:85880c00 r4:85880c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85880c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc99e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85900380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85880c00 r7:00000000 r6:83018000 r5:00001000 r4:7f197000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9fd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588af8c r4:8588ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588af8c r4:8583dd00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85880c00 r8:8583dd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8583dd00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583dd00 r8:8027ecf4 r7:ecc95e60 r6:8583dd80 r5:85880c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc99fb0 to 0xecc99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85900300 INFO: task kworker/0:457:6252 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b6742000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:458:6255 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:458 state:D stack:0 pid:6255 tgid:6255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc9dd84 r8:00000002 r7:60000113 r6:ecc9dd8c r5:85881800 r4:85881800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85881800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc9de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859001c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85881800 r7:00000000 r6:83018000 r5:00001000 r4:7f195000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9f3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588ab8c r4:8588a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588ab8c r4:8583de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85881800 r8:8583de2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8583de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583de00 r8:8027ecf4 r7:ecc99e60 r6:8583de80 r5:85881800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc9dfb0 to 0xecc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85900180 INFO: task kworker/0:458:6255 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b6993000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:459:6256 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:459 state:D stack:0 pid:6256 tgid:6256 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecca1d84 r8:00000002 r7:60000013 r6:ecca1d8c r5:85882400 r4:85882400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85882400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85900800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85882400 r7:00000000 r6:83018000 r5:00001000 r4:7f19d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca37000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588bb8c r4:8588b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588bb8c r4:8583df00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85882400 r8:8583df2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8583df00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583df00 r8:8027ecf4 r7:ecc99e60 r6:8583df80 r5:85882400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecca1fb0 to 0xecca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85900340 INFO: task kworker/0:459:6256 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b6d02000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:460:6257 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:460 state:D stack:0 pid:6257 tgid:6257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc85d84 r8:00000002 r7:60000013 r6:ecc85d8c r5:85883000 r4:85883000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85883000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc85e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85900540 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85883000 r7:00000000 r6:83018000 r5:00001000 r4:7f199000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca0b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588b38c r4:8588b000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588b38c r4:85905000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85883000 r8:8590502c r7:82804d40 r6:dddced40 r5:dddced60 r4:85905000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905000 r8:8027ecf4 r7:ecca1e60 r6:85905080 r5:85883000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc85fb0 to 0xecc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85900680 INFO: task kworker/0:460:6257 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b6d02000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:461:6260 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:461 state:D stack:0 pid:6260 tgid:6260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecca5d84 r8:00000002 r7:60000113 r6:ecca5d8c r5:85883c00 r4:85883c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85883c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85900700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85883c00 r7:00000000 r6:83018000 r5:00001000 r4:7f19b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca15000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588b78c r4:8588b400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588b78c r4:85905100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85883c00 r8:8590512c r7:82804d40 r6:dddced40 r5:dddced60 r4:85905100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905100 r8:8027ecf4 r7:ecca1e60 r6:85905180 r5:85883c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecca5fb0 to 0xecca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859006c0 INFO: task kworker/0:461:6260 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b73ab000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:462:6263 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:462 state:D stack:0 pid:6263 tgid:6263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eccadd84 r8:00000002 r7:60000013 r6:eccadd8c r5:85884800 r4:85884800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85884800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccade08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85900980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85884800 r7:00000000 r6:83018000 r5:00001000 r4:7f19f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588bf8c r4:8588bc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588bf8c r4:85905200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85884800 r8:8590522c r7:82804d40 r6:dddced40 r5:dddced60 r4:85905200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905200 r8:8027ecf4 r7:ecca1e60 r6:85905280 r5:85884800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccadfb0 to 0xeccadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85900b80 INFO: task kworker/0:462:6263 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b767f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:463:6264 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:463 state:D stack:0 pid:6264 tgid:6264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eccb1d84 r8:00000002 r7:60000113 r6:eccb1d8c r5:85886000 r4:85886000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85886000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85900a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85886000 r7:00000000 r6:83018000 r5:00001000 r4:7f1a1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca5f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589038c r4:85890000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589038c r4:85905300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85886000 r8:8590532c r7:82804d40 r6:dddced40 r5:dddced60 r4:85905300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905300 r8:8027ecf4 r7:eccade60 r6:85905380 r5:85886000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccb1fb0 to 0xeccb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859008c0 INFO: task kworker/0:463:6264 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b7738000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:464:6266 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:464 state:D stack:0 pid:6266 tgid:6266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecca9d84 r8:00000002 r7:60000113 r6:ecca9d8c r5:85886c00 r4:85886c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85886c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85900e00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85886c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1a5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca77000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85890b8c r4:85890800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85890b8c r4:85905400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85886c00 r8:8590542c r7:82804d40 r6:dddced40 r5:dddced60 r4:85905400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905400 r8:8027ecf4 r7:eccb1e60 r6:85905480 r5:85886c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecca9fb0 to 0xecca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85900a00 INFO: task kworker/0:464:6266 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b7738000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:465:6268 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:465 state:D stack:0 pid:6268 tgid:6268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eccb5d84 r8:00000002 r7:60000113 r6:eccb5d8c r5:851a8000 r4:851a8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85900d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f1a3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca69000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589078c r4:85890400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589078c r4:85905500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a8000 r8:8590552c r7:82804d40 r6:dddced40 r5:dddced60 r4:85905500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905500 r8:8027ecf4 r7:ecca9e60 r6:85905580 r5:851a8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccb5fb0 to 0xeccb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85900b00 INFO: task kworker/0:465:6268 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b7ceb000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:466:6269 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:466 state:D stack:0 pid:6269 tgid:6269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eccb9d84 r8:00000002 r7:60000113 r6:eccb9d8c r5:851a8c00 r4:851a8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85842f80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca85000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85890f8c r4:85890c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85890f8c r4:85905600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a8c00 r8:8590562c r7:82804d40 r6:dddced40 r5:dddced60 r4:85905600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905600 r8:8027ecf4 r7:ecca9e60 r6:85905680 r5:851a8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccb9fb0 to 0xeccb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85900fc0 INFO: task kworker/0:466:6269 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b7ceb000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:467:6272 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:467 state:D stack:0 pid:6272 tgid:6272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eccbdd84 r8:00000002 r7:60000113 r6:eccbdd8c r5:851a9800 r4:851a9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccbde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85913000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f1ab000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca99000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589138c r4:85891000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589138c r4:85905700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a9800 r8:8590572c r7:82804d40 r6:dddced40 r5:dddced60 r4:85905700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905700 r8:8027ecf4 r7:eccb9e60 r6:85905780 r5:851a9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccbdfb0 to 0xeccbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85842600 INFO: task kworker/0:467:6272 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b82b7000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:468:6275 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:468 state:D stack:0 pid:6275 tgid:6275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eccc1d84 r8:00000002 r7:60000013 r6:eccc1d8c r5:851aa400 r4:851aa400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851aa400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccc1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85913700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f1b5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecadf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85891f8c r4:85891c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85891f8c r4:85905800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851aa400 r8:8590582c r7:82804d40 r6:dddced40 r5:dddced60 r4:85905800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905800 r8:8027ecf4 r7:eccbde60 r6:85905880 r5:851aa400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc1fb0 to 0xeccc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859133c0 INFO: task kworker/0:468:6275 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b853f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:469:6276 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:469 state:D stack:0 pid:6276 tgid:6276 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eccc5d84 r8:00000002 r7:60000113 r6:eccc5d8c r5:851ab000 r4:851ab000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ab000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccc5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85913140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f1ad000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaa7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589178c r4:85891400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589178c r4:85905900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ab000 r8:8590592c r7:82804d40 r6:dddced40 r5:dddced60 r4:85905900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905900 r8:8027ecf4 r7:eccc1e60 r6:85905980 r5:851ab000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc5fb0 to 0xeccc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85913080 INFO: task kworker/0:469:6276 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b8710000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:470:6280 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:470 state:D stack:0 pid:6280 tgid:6280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eccc9d84 r8:00000002 r7:60000013 r6:eccc9d8c r5:85793000 r4:85793000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85793000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccc9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85913880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85793000 r7:00000000 r6:83018000 r5:00001000 r4:7f1b7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaeb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589238c r4:85892000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589238c r4:85905a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85793000 r8:85905a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85905a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905a00 r8:8027ecf4 r7:eccc1e60 r6:85471a00 r5:85793000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc9fb0 to 0xeccc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85913840 INFO: task kworker/0:470:6280 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b88c9000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:471:6283 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:471 state:D stack:0 pid:6283 tgid:6283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecccdd84 r8:00000002 r7:60000113 r6:ecccdd8c r5:85795400 r4:85795400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85795400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecccde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85913980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85795400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb23000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589278c r4:85892400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589278c r4:85905a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85795400 r8:85905aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85905a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905a80 r8:8027ecf4 r7:eccc9e60 r6:85471a80 r5:85795400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecccdfb0 to 0xecccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85913640 INFO: task kworker/0:471:6283 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b8b02000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:472:6285 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:472 state:D stack:0 pid:6285 tgid:6285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb19d84 r8:00000002 r7:60000113 r6:ecb19d8c r5:85796000 r4:85796000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85796000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb19e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85913a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85796000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5b3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85892b8c r4:85892800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85892b8c r4:85905b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85796000 r8:85905b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85905b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905b00 r8:8027ecf4 r7:ecccde60 r6:85471b00 r5:85796000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb19fb0 to 0xecb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85913800 INFO: task kworker/0:472:6285 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b8b02000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:473:6288 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:473 state:D stack:0 pid:6288 tgid:6288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eccddd84 r8:00000002 r7:60000013 r6:eccddd8c r5:85794800 r4:85794800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85794800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccdde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85913bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85794800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85892f8c r4:85892c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85892f8c r4:85905b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85794800 r8:85905bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85905b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905b80 r8:8027ecf4 r7:ecb19e60 r6:85471b80 r5:85794800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccddfb0 to 0xeccddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85913a80 INFO: task kworker/0:473:6288 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b8d4b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:474:6289 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:474 state:D stack:0 pid:6289 tgid:6289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecce1d84 r8:00000002 r7:60000113 r6:ecce1d8c r5:85790000 r4:85790000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85790000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecce1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85913d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85790000 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb31000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589338c r4:85893000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589338c r4:85905c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85790000 r8:85905c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85905c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905c00 r8:8027ecf4 r7:eccdde60 r6:85471c00 r5:85790000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecce1fb0 to 0xecce1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85913b40 INFO: task kworker/0:474:6289 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b8ff9000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:475:6291 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:475 state:D stack:0 pid:6291 tgid:6291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecce9d84 r8:00000002 r7:60000013 r6:ecce9d8c r5:85885400 r4:85885400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85885400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecce9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859221c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85885400 r7:00000000 r6:83018000 r5:00001000 r4:7f12f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec771000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85898b8c r4:85898800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85898b8c r4:85905c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85885400 r8:85905cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85905c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905c80 r8:8027ecf4 r7:ecce1e60 r6:85471c80 r5:85885400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecce9fb0 to 0xecce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85913b40 INFO: task kworker/0:475:6291 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b8ff9000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:476:6292 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:476 state:D stack:0 pid:6292 tgid:6292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eccedd84 r8:00000002 r7:60000113 r6:eccedd8c r5:85793c00 r4:85793c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85793c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccede08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85913ec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85793c00 r7:00000000 r6:83018000 r5:00001000 r4:7f123000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc9f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589378c r4:85893400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589378c r4:85905d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85793c00 r8:85905d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85905d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905d00 r8:8027ecf4 r7:ecce9e60 r6:85471d00 r5:85793c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccedfb0 to 0xeccedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85913b40 INFO: task kworker/0:476:6292 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b9187000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:477:6294 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:477 state:D stack:0 pid:6294 tgid:6294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eccf5d84 r8:00000002 r7:60000013 r6:eccf5d8c r5:85796c00 r4:85796c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85796c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccf5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85913f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85796c00 r7:00000000 r6:83018000 r5:00001000 r4:7f125000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcf1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85893b8c r4:85893800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85893b8c r4:85905d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85796c00 r8:85905dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85905d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905d80 r8:8027ecf4 r7:ecce9e60 r6:85471d80 r5:85796c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccf5fb0 to 0xeccf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85913240 INFO: task kworker/0:477:6294 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b9581000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:478:6296 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:478 state:D stack:0 pid:6296 tgid:6296 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eccfdd84 r8:00000002 r7:60000113 r6:eccfdd8c r5:84d2e000 r4:84d2e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d2e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccfde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858435c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d2e000 r7:00000000 r6:83018000 r5:00001000 r4:7f127000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec731000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85893f8c r4:85893c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85893f8c r4:85905e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d2e000 r8:85905e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85905e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905e00 r8:8027ecf4 r7:ecce9e60 r6:85471e00 r5:84d2e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccfdfb0 to 0xeccfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85843740 INFO: task kworker/0:478:6296 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b9581000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:479:6298 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:479 state:D stack:0 pid:6298 tgid:6298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd05d84 r8:00000002 r7:60000013 r6:ecd05d8c r5:858c8c00 r4:858c8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858c8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd05e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859139c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f12b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec743000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589838c r4:85898000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589838c r4:85905f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858c8c00 r8:85905f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85905f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905f00 r8:8027ecf4 r7:ecce9e60 r6:85471e80 r5:858c8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd05fb0 to 0xecd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858297c0 INFO: task kworker/0:479:6298 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b9922000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:480:6300 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:480 state:D stack:0 pid:6300 tgid:6300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eccd5d84 r8:00000002 r7:60000113 r6:eccd5d8c r5:851abc00 r4:851abc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851abc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccd5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85922000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f12d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec75b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589878c r4:85898400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589878c r4:85905e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851abc00 r8:85905eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85905e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85905e80 r8:8027ecf4 r7:ecce9e60 r6:85905f80 r5:851abc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccd5fb0 to 0xeccd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85922140 INFO: task kworker/0:480:6300 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b9922000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:481:6303 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:481 state:D stack:0 pid:6303 tgid:6303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd09d84 r8:00000002 r7:60000013 r6:ecd09d8c r5:851ae000 r4:851ae000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ae000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd09e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85922680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec87f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589978c r4:85899400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589978c r4:85924000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ae000 r8:8592402c r7:82804d40 r6:dddced40 r5:dddced60 r4:85924000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85924000 r8:8027ecf4 r7:ecce9e60 r6:85924080 r5:851ae000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd09fb0 to 0xecd09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85922180 INFO: task kworker/0:481:6303 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b9c31000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:6305 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:482 state:D stack:0 pid:6305 tgid:6305 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd0dd84 r8:00000002 r7:60000113 r6:ecd0dd8c r5:851aec00 r4:851aec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851aec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd0de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859223c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f131000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec797000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85898f8c r4:85898c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85898f8c r4:85924100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851aec00 r8:8592412c r7:82804d40 r6:dddced40 r5:dddced60 r4:85924100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85924100 r8:8027ecf4 r7:ecd09e60 r6:85924180 r5:851aec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd0dfb0 to 0xecd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85922380 INFO: task kworker/0:482:6305 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: b9ed9000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:483:6306 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:483 state:D stack:0 pid:6306 tgid:6306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb4dd84 r8:00000002 r7:60000113 r6:ecb4dd8c r5:851ac800 r4:851ac800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ac800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb4de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85922580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f139000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7b1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589938c r4:85899000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589938c r4:85924200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ac800 r8:8592422c r7:82804d40 r6:dddced40 r5:dddced60 r4:85924200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85924200 r8:8027ecf4 r7:ecd09e60 r6:85924280 r5:851ac800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb4dfb0 to 0xecb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85922380 INFO: task kworker/0:483:6306 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ba1b1000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:484:6309 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:484 state:D stack:0 pid:6309 tgid:6309 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd15d84 r8:00000002 r7:60000113 r6:ecd15d8c r5:84d60000 r4:84d60000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d60000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd15e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85922b40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d60000 r7:00000000 r6:83018000 r5:00001000 r4:7f141000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8f5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85899f8c r4:85899c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85899f8c r4:85924300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d60000 r8:8592432c r7:82804d40 r6:dddced40 r5:dddced60 r4:85924300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85924300 r8:8027ecf4 r7:ecd09e60 r6:85924380 r5:84d60000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd15fb0 to 0xecd15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85922600 INFO: task kworker/0:484:6309 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ba21b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:485:6311 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:485 state:D stack:0 pid:6311 tgid:6311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd1dd84 r8:00000002 r7:60000113 r6:ecd1dd8c r5:84d61800 r4:84d61800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d61800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd1de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85922a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d61800 r7:00000000 r6:83018000 r5:00001000 r4:7f13f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85899b8c r4:85899800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85899b8c r4:85924400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d61800 r8:8592442c r7:82804d40 r6:dddced40 r5:dddced60 r4:85924400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85924400 r8:8027ecf4 r7:ecd15e60 r6:85924480 r5:84d61800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd1dfb0 to 0xecd1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85922940 INFO: task kworker/0:485:6311 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ba5ba000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:486:6314 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:486 state:D stack:0 pid:6314 tgid:6314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd19d84 r8:00000002 r7:60000013 r6:ecd19d8c r5:84d62400 r4:84d62400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d62400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd19e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85922d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d62400 r7:00000000 r6:83018000 r5:00001000 r4:7f145000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec927000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589a78c r4:8589a400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589a78c r4:85924500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d62400 r8:8592452c r7:82804d40 r6:dddced40 r5:dddced60 r4:85924500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85924500 r8:8027ecf4 r7:ecd15e60 r6:85924580 r5:84d62400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd19fb0 to 0xecd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85922ac0 INFO: task kworker/0:486:6314 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ba853000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:487:6316 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:487 state:D stack:0 pid:6316 tgid:6316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd21d84 r8:00000002 r7:60000013 r6:ecd21d8c r5:84d63000 r4:84d63000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d63000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd21e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85922c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d63000 r7:00000000 r6:83018000 r5:00001000 r4:7f143000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec911000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589a38c r4:8589a000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589a38c r4:85924600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d63000 r8:8592462c r7:82804d40 r6:dddced40 r5:dddced60 r4:85924600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85924600 r8:8027ecf4 r7:ecd19e60 r6:85924680 r5:84d63000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85922c40 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/0:488:6318 blocked for more than 473 seconds. r4:84d63c00 r5:84d63c00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589ab8c r4:8589a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589ab8c r4:85924700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d63c00 r8:8592472c r7:82804d40 r6:dddced40 r5:dddced60 r4:85924700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85924700 r8:8027ecf4 r7:ecd19e60 r6:85924780 r5:84d63c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd25fb0 to 0xecd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85922d80 INFO: task kworker/0:488:6318 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: bab32000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/0:489:6321 blocked for more than 473 seconds. r5:84d64800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85930240 r7:dddced40 r6:83018000 r5:8589b38c r4:85924800 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) Workqueue: events bpf_prog_free_deferred r5:84d65400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:491:6324 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:491 state:D stack:0 pid:6324 tgid:6324 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd2dd84 r8:00000002 r7:60000013 r6:ecd2dd8c r5:84d66000 r4:84d66000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d66000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd2de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85930600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d66000 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9a9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589bb8c r4:8589b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589bb8c r4:85924a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d66000 r8:85924a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85924a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85924a00 r8:8027ecf4 r7:ecd29e60 r6:85924a80 r5:84d66000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd2dfb0 to 0xecd2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85930200 INFO: task kworker/0:491:6324 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: bb389000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:492:6326 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:492 state:D stack:0 pid:6326 tgid:6326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84d60c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd31e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85924b00 r8:8027ecf4 r7:ecd2de60 r6:85924b80 r5:84d60c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:493:6329 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:493 state:D stack:0 pid:6329 tgid:6329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd35d84 r8:00000002 r7:60000113 r6:ecd35d8c r5:84d66c00 r4:84d66c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d66c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd35e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85930680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d66c00 r7:00000000 r6:83018000 r5:00001000 r4:7f15b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9bd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589bf8c r4:8589bc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589bf8c r4:85924c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d66c00 r8:85924c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85924c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85924c00 r8:8027ecf4 r7:ecd2de60 r6:85924c80 r5:84d66c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd35fb0 to 0xecd35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859305c0 INFO: task kworker/0:493:6329 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: bb762000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e06cddc0 r4:00000000 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:494:6330 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:494 state:D stack:0 pid:6330 tgid:6330 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd39d84 r8:00000002 r7:60000013 r6:ecd39d8c r5:851ad400 r4:851ad400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ad400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd39e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85930780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f15d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaf9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a438c r4:858a4000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858a438c r4:85924d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ad400 r8:85924d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85924d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85924d00 r8:8027ecf4 r7:ecd35e60 r6:85924d80 r5:851ad400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd39fb0 to 0xecd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859308c0 INFO: task kworker/0:494:6330 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: bb8c3000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:495:6333 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:495 state:D stack:0 pid:6333 tgid:6333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd3dd84 r8:00000002 r7:60000113 r6:ecd3dd8c r5:85948000 r4:85948000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85948000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd3de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85930900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85948000 r7:00000000 r6:83018000 r5:00001000 r4:7f15f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb05000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a478c r4:858a4400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858a478c r4:85924e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85948000 r8:85924e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85924e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85924e00 r8:8027ecf4 r7:ecd39e60 r6:85924e80 r5:85948000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd3dfb0 to 0xecd3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859307c0 INFO: task kworker/0:495:6333 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: bba5a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:496:6334 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:496 state:D stack:0 pid:6334 tgid:6334 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd41d84 r8:00000002 r7:60000113 r6:ecd41d8c r5:85948c00 r4:85948c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85948c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd41e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85930d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85948c00 r7:00000000 r6:83018000 r5:00001000 r4:7f163000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85948c00 r8:85924f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85924f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85924f00 r8:8027ecf4 r7:ecd3de60 r6:85924f80 r5:85948c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd41fb0 to 0xecd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85930880 INFO: task kworker/0:496:6334 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: bba5a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:497:6336 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:497 state:D stack:0 pid:6336 tgid:6336 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd45d84 r8:00000002 r7:60000113 r6:ecd45d8c r5:85949800 r4:85949800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85949800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd45e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85930b80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85949800 r7:00000000 r6:83018000 r5:00001000 r4:7f161000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb21000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a4b8c r4:858a4800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858a4b8c r4:8593b000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85949800 r8:8593b02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8593b000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8593b000 r8:8027ecf4 r7:ecd41e60 r6:8593b080 r5:85949800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd45fb0 to 0xecd45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85930b40 INFO: task kworker/0:497:6336 is blocked on a mutex likely owned by task kworker/1:290:3848. Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:498:6338 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:498 state:D stack:0 pid:6338 tgid:6338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd49d84 r8:00000002 r7:60000113 r6:ecd49d8c r5:8594a400 r4:8594a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8594a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd49e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85930e00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8594a400 r7:00000000 r6:83018000 r5:00001000 r4:7f165000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb3b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a538c r4:858a5000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858a538c r4:8593b100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8594a400 r8:8593b12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8593b100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8593b100 r8:8027ecf4 r7:ecd41e60 r6:8593b180 r5:8594a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd49fb0 to 0xecd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85930d00 INFO: task kworker/0:498:6338 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: bc229000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8594b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe06cdd20 to 0xe06cdd68) [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:00001000 r4:dfd83000 r5:84ff7f8c r4:84ff7c00 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:8594bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:858a638c r4:8593b300 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85930fc0 INFO: task kworker/0:500:6341 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: bc330000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:501:6343 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:501 state:D stack:0 pid:6343 tgid:6343 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd59d84 r8:00000002 r7:60000113 r6:ecd59d8c r5:8594d400 r4:8594d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8594d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd59e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85978140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8594d400 r7:00000000 r6:83018000 r5:00001000 r4:7f169000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbbf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a5b8c r4:858a5800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858a5b8c r4:8593b400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8594d400 r8:8593b42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8593b400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8593b400 r8:8027ecf4 r7:ecd55e60 r6:8593b480 r5:8594d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd59fb0 to 0xecd59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85978080 INFO: task kworker/0:501:6343 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: bc876000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e06cddc0 r5:00001000 r4:dfd83000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/0:502:6345 blocked for more than 473 seconds. r5:8594e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85978500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8594e000 r7:00000000 r6:83018000 r5:00001000 r4:7f16f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbd9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a5f8c r4:858a5c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858a5f8c r4:8593b500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8594e000 r8:8593b52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8593b500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8593b500 r8:8027ecf4 r7:ecd55e60 r6:8593b580 r5:8594e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd5dfb0 to 0xecd5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85978080 INFO: task kworker/0:502:6345 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: bc876000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:503:6349 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:503 state:D stack:0 pid:6349 tgid:6349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd61d84 r8:00000002 r7:60000013 r6:ecd61d8c r5:8594c800 r4:8594c800 r5:8594c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85978a00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r4:e06cddc0 r4:00000000 r5:84ff7f8c r4:84ff7c00 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:504:6350 blocked for more than 473 seconds. [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:8594ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd51e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859786c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8594ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f173000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbf7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a678c r4:858a6400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858a678c r4:8593b700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8594ec00 r8:8593b72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8593b700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8593b700 r8:8027ecf4 r7:ecd61e60 r6:8593b780 r5:8594ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd51fb0 to 0xecd51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85978880 INFO: task kworker/0:504:6350 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: bcf80000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:851b0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851b0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd65e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85978940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a6b8c r4:858a6800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858a6b8c r4:8593b800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b0000 r8:8593b82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8593b800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8593b800 r8:8027ecf4 r7:ecd61e60 r6:8593b880 r5:851b0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd65fb0 to 0xecd65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85978700 INFO: task kworker/0:505:6352 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:84ff7f8c r4:84ff7c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:851b0c00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r5:00001000 r4:eb8d5000 r7:dddced40 r6:83018000 r5:858a738c r4:8593b900 Exception stack(0xecc4dfb0 to 0xecc4dff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/0:507 state:D stack:0 pid:6357 tgid:6357 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:851b1800 r5:851b1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd69e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85978e00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc41000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a7b8c r4:858a7800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858a7b8c r4:8593ba00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b1800 r8:8593ba2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8593ba00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8593ba00 r8:8027ecf4 r7:ecc4de60 r6:8593ba80 r5:851b1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd69fb0 to 0xecd69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85978c80 INFO: task kworker/0:507:6357 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: bd549000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:508:6359 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:508 state:D stack:0 pid:6359 tgid:6359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd75d84 r8:00000002 r7:60000013 r6:ecd75d8c r5:858cb000 r4:858cb000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858cb000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd75e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85978d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba95000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a778c r4:858a7400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858a778c r4:8593bb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858cb000 r8:8593bb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8593bb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8593bb00 r8:8027ecf4 r7:ecd69e60 r6:85471f00 r5:858cb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd75fb0 to 0xecd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85978d00 INFO: task kworker/0:508:6359 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: bdd1b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r5:00001000 r4:dfd83000 r5:84ff7f8c r4:84ff7c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:509:6361 blocked for more than 473 seconds. Workqueue: events bpf_prog_free_deferred r4:858ce000 r5:858ce000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:858b078c r4:858b0400 r7:dddced40 r6:83018000 r5:858b078c r4:8593bb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858ce000 r8:8593bbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8593bb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8593bb80 r8:8027ecf4 r7:ecd69e60 r6:85471f80 r5:858ce000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd7dfb0 to 0xecd7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85978e40 INFO: task kworker/0:509:6361 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: be054000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:510:6362 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:510 state:D stack:0 pid:6362 tgid:6362 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd81d84 r8:00000002 r7:60000013 r6:ecd81d8c r5:858cec00 r4:858cec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858cec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd81e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85914a00 r5:858a7f8c r4:858a7c00 r4:8593bc00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:800f0113 r4:80239bb0 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:511 state:D stack:0 pid:6364 tgid:6364 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:858cbc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598b080 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8593bc80 r8:8027ecf4 r7:ecd7de60 r6:85991000 r5:858cbc00 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:512:6367 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:512 state:D stack:0 pid:6367 tgid:6367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd95d84 r8:00000002 r7:60000013 r6:ecd95d8c r5:858ca400 r4:858ca400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858ca400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd95e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598b240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f17b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b0b8c r4:858b0800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b0b8c r4:8593bd00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858ca400 r8:8593bd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8593bd00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8593bd00 r8:8027ecf4 r7:ecd7de60 r6:85991080 r5:858ca400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd95fb0 to 0xecd95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8598b140 INFO: task kworker/0:512:6367 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: be770000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:513:6369 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:513 state:D stack:0 pid:6369 tgid:6369 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd99d84 r8:00000002 r7:60000013 r6:ecd99d8c r5:858cc800 r4:858cc800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858cc800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd99e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598b4c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f17d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec831000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b0f8c r4:858b0c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b0f8c r4:8593bd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858cc800 r8:8593bdac r7:82804d40 r6:dddced40 r5:dddced60 r4:8593bd80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8593bd80 r8:8027ecf4 r7:ecd95e60 r6:85991100 r5:858cc800 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:851b3c00 r4:829189bc r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecd6dfb0 to 0xecd6dff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: bee18000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:515:6374 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:515 state:D stack:0 pid:6374 tgid:6374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd9dd84 r8:00000002 r7:60000013 r6:ecd9dd8c r5:851b3000 r4:851b3000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851b3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd9de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598ba40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f187000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858b1b8c r4:858b1800 r4:8593bf00 dfa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:851b5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85993000 r8:8027ecf4 r7:ecd9de60 r6:85993080 r5:851b5400 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:851b4800 r5:851b4800 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f18d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca1d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b278c r4:858b2400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b278c r4:85993100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b4800 r8:8599312c r7:82804d40 r6:dddced40 r5:dddced60 r4:85993100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85993100 r8:8027ecf4 r7:ecd9de60 r6:85993180 r5:851b4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecda5fb0 to 0xecda5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8598b980 INFO: task kworker/0:517:6378 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: bf2a4000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:518:6379 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:518 state:D stack:0 pid:6379 tgid:6379 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecda9d84 r8:00000002 r7:60000013 r6:ecda9d8c r5:851b6000 r5:851b6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:858b238c r4:858b2000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:519 state:D stack:0 pid:6383 tgid:6383 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:851b2400 r4:829189bc r4:00000000 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8598bc00 INFO: task kworker/0:519:6383 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: bf52b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:520:6385 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:520 state:D stack:0 pid:6385 tgid:6385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc55d84 r8:00000002 r7:60000013 r6:ecc55d8c r5:851b6c00 r4:851b6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851b6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc55e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598e140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f191000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca67000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:851b6c00 r8:8599342c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:521 state:D stack:0 pid:6387 tgid:6387 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84e48000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdb1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598e2c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e48000 r7:00000000 r6:83018000 r5:00001000 r4:7f193000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca79000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b338c r4:858b3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b338c r4:85993500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e48000 r8:8599352c r7:82804d40 r6:dddced40 r5:dddced60 r4:85993500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85993500 r8:8027ecf4 r7:ecc55e60 r6:85993580 r5:84e48000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdb1fb0 to 0xecdb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8598e400 INFO: task kworker/0:521:6387 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:522 state:D stack:0 pid:6389 tgid:6389 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84e48c00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdb5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598e680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e48c00 r7:00000000 r6:83018000 r5:00001000 r4:7f197000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaa9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b3b8c r4:858b3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b3b8c r4:85993600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e48c00 r8:8599362c r7:82804d40 r6:dddced40 r5:dddced60 r4:85993600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85993600 r8:8027ecf4 r7:ecdb1e60 r6:85993680 r5:84e48c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdb5fb0 to 0xecdb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8598e200 INFO: task kworker/0:522:6389 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 r5:84ff7f8c r4:84ff7c00 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:523 state:D stack:0 pid:6392 tgid:6392 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84e49800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598e640 r7:dddced40 r6:83018000 r5:858b3f8c r4:85993700 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: bff6e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858cd400 r5:858cd400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xecdc5fb0 to 0xecdc5ff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0113 r4:80239bb0 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8501e100 Workqueue: events bpf_prog_free_deferred r5:83a96c00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdcde08 r5:00001000 r4:ece07000 r7:dddced40 r6:83018000 r5:858ba78c r4:85993880 dfa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 r5:84ff7f8c r4:84ff7c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8501e100 task:kworker/0:526 state:D stack:0 pid:6397 tgid:6397 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:858c8000 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598eb80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f19f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc03000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b8b8c r4:858b8800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b8b8c r4:85993900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858c8000 r8:8599392c r7:82804d40 r6:dddced40 r5:dddced60 r4:85993900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85993900 r8:8027ecf4 r7:ecdcde60 r6:85991280 r5:858c8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdd1fb0 to 0xecdd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8598e880 INFO: task kworker/0:526:6397 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c0714000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Not tainted 6.15.0-syzkaller #0 r4:85960000 r5:85960000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd9e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85960000 r8:859939ac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85960c00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598ee40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85960c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1a3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc21000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b938c r4:858b9000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b938c r4:85993a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85960c00 r8:85993a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85993a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85993a00 r8:8027ecf4 r7:ecdcde60 r6:85991380 r5:85960c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecde1fb0 to 0xecde1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8598ed40 INFO: task kworker/0:528:6402 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c0b04000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85963000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecde9e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8598ed40 Call trace: dd60: 800f0113 ffffffff r4:e06cddc0 r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85962400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ecc43000 r7:dddced40 r6:83018000 r5:858b9b8c r4:85993b00 1fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c0e06000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:531:6408 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:531 state:D stack:0 pid:6408 tgid:6408 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecdf9d84 r8:00000002 r7:60000113 r6:ecdf9d8c r5:85963c00 r4:85963c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85963c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdf9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85988ec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85963c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1ab000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc63000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b9f8c r4:858b9c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b9f8c r4:85993b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85963c00 r8:85993bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85993b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85993b80 r8:8027ecf4 r7:ecdcde60 r6:85991500 r5:85963c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdf9fb0 to 0xecdf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:8501e100 task:kworker/0:532 state:D stack:0 pid:6410 tgid:6410 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ece01d84 r8:00000002 r7:60000113 r6:ece01d8c r5:85961800 r4:85961800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85961800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece01e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ab040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85961800 r7:00000000 r6:83018000 r5:00001000 r4:7f1ad000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc6d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858ba38c r4:858ba000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858ba38c r4:85993c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85961800 r8:85993c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85993c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85993c00 r8:8027ecf4 r7:ecdcde60 r6:85991580 r5:85961800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece01fb0 to 0xece01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85988e40 INFO: task kworker/0:532:6410 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c114f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:533:6413 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:533 state:D stack:0 pid:6413 tgid:6413 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ece15d84 r8:00000002 r7:60000013 r6:ece15d8c r5:85964800 r4:85964800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85964800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece15e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe06cdd20 to 0xe06cdd68) [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85966000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:858bab8c r4:858ba800 r4:85993d00 Exception stack(0xece29fb0 to 0xece29ff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:535 state:D stack:0 pid:6416 tgid:6416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ece2dd84 r8:00000002 r7:60000013 r6:ece2dd8c r5:85966c00 r4:85966c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85966c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece2de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ab3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85966c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1bb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece1f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858baf8c r4:858bac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858baf8c r4:85993d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85966c00 r8:85993dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85993d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85993d80 r8:8027ecf4 r7:ece15e60 r6:85991700 r5:85966c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece2dfb0 to 0xece2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859ab200 INFO: task kworker/0:535:6416 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c146f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85965400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85993e00 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe06cdd20 to 0xe06cdd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:537:6420 blocked for more than 474 seconds. r4:858d0c00 r5:858d0c00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018005 r8:858d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1bf000 r10:61c88647 r9:858d0c00 r8:85993eac r7:82804d40 r6:dddced40 r5:dddced60 r4:859ab480 INFO: task kworker/0:537:6420 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c1b9f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:538:6423 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:538 state:D stack:0 pid:6423 tgid:6423 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ece61d84 r8:00000002 r7:60000113 r6:ece61d8c r5:858d1800 r4:858d1800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece61e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca0800 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85993f00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:858d3c00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:858bbf8c r4:85993f80 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c2102000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:540:6427 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:540 state:D stack:0 pid:6427 tgid:6427 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ece75d84 r8:00000002 r7:60000113 r6:ece75d8c r5:858d2400 r4:858d2400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece75e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ab980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece5d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bc38c r4:858bc000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858bc38c r4:859c2000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858d2400 r8:859c202c r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2000 r8:8027ecf4 r7:ece61e60 r6:85991980 r5:858d2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece75fb0 to 0xece75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859ab840 INFO: task kworker/0:540:6427 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c2102000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:541 state:D stack:0 pid:6429 tgid:6429 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:858d0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859ab9c0 INFO: task kworker/0:541:6429 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c2102000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:542:6430 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:542 state:D stack:0 pid:6430 tgid:6430 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ece89d84 r8:00000002 r7:60000113 r6:ece89d8c r5:858d5400 r5:858d5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:859abb80 Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:543 state:D stack:0 pid:6433 tgid:6433 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:858d4800 r4:829189bc r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r4:e06cddc0 r5:00001000 r4:dfd83000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:544:6434 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:544 state:D stack:0 pid:6434 tgid:6434 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecea9d84 r8:00000002 r7:60000113 r6:ecea9d8c r5:858d3000 r4:858d3000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85988200 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f1cf000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece99000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bd38c r4:858bd000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858bd38c r4:859c2200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858d3000 r8:859c222c r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2200 r8:8027ecf4 r7:ece61e60 r6:85991b80 r5:858d3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea9fb0 to 0xecea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85988500 INFO: task kworker/0:544:6434 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c2a0c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:545:6437 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:545 state:D stack:0 pid:6437 tgid:6437 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eceb5d84 r8:00000002 r7:60000113 r6:eceb5d8c r5:858d6000 r4:858d6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceb5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c8000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb737000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bdb8c r4:858bd800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858bdb8c r4:859c2280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858d6000 r8:859c22ac r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2280 r8:8027ecf4 r7:ece61e60 r6:85991c00 r5:858d6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceb5fb0 to 0xeceb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ca0c40 INFO: task kworker/0:545:6437 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c2a0c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:546:6440 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:546 state:D stack:0 pid:6440 tgid:6440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecebdd84 r8:00000002 r7:60000013 r6:ecebdd8c r5:858c9800 r4:858c9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858c9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecebde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c8140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb21000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bdf8c r4:858bdc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858bdf8c r4:859c2300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858c9800 r8:859c232c r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2300 r8:8027ecf4 r7:eceb5e60 r6:85991c80 r5:858c9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecebdfb0 to 0xecebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859c8280 INFO: task kworker/0:546:6440 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c2d1c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:547:6441 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:547 state:D stack:0 pid:6441 tgid:6441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecec5d84 r8:00000002 r7:60000113 r6:ecec5d8c r5:858d8c00 r4:858d8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c8740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f125000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec76b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bef8c r4:858bec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858bef8c r4:859c2380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858d8c00 r8:859c23ac r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2380 r8:8027ecf4 r7:ecebde60 r6:85991d00 r5:858d8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecec5fb0 to 0xecec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859c8280 INFO: task kworker/0:547:6441 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c321d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:548:6442 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:548 state:D stack:0 pid:6442 tgid:6442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecdbdd84 r8:00000002 r7:60000113 r6:ecdbdd8c r5:84e4a400 r4:84e4a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e4a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdbde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c82c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e4a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcb1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858be38c r4:858be000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858be38c r4:859c2400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e4a400 r8:859c242c r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2400 r8:8027ecf4 r7:ecec5e60 r6:859c2480 r5:84e4a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdbdfb0 to 0xecdbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859c8400 INFO: task kworker/0:548:6442 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c321d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:549:6446 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:549 state:D stack:0 pid:6446 tgid:6446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecec1d84 r8:00000002 r7:60000013 r6:ecec1d8c r5:84e4b000 r4:84e4b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e4b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c8440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec727000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858be78c r4:858be400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858be78c r4:859c2500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e4b000 r8:859c252c r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2500 r8:8027ecf4 r7:ecec5e60 r6:859c2580 r5:84e4b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecec1fb0 to 0xecec1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859c8380 INFO: task kworker/0:549:6446 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c34c3000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:550:6447 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:550 state:D stack:0 pid:6447 tgid:6447 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ececdd84 r8:00000002 r7:60000013 r6:ececdd8c r5:84e4bc00 r4:84e4bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e4bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ececde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c8500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e4bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f123000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec74b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858beb8c r4:858be800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858beb8c r4:859c2600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e4bc00 r8:859c262c r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2600 r8:8027ecf4 r7:ecec5e60 r6:859c2680 r5:84e4bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xececdfb0 to 0xececdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859c8380 INFO: task kworker/0:550:6447 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c3761000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:551:6449 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:551 state:D stack:0 pid:6449 tgid:6449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eced1d84 r8:00000002 r7:60000113 r6:eced1d8c r5:84e4c800 r4:84e4c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e4c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c8800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e4c800 r7:00000000 r6:83018000 r5:00001000 r4:7f127000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7a1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bf38c r4:858bf000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858bf38c r4:859c2700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e4c800 r8:859c272c r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2700 r8:8027ecf4 r7:ecec5e60 r6:859c2780 r5:84e4c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced1fb0 to 0xeced1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859c8700 INFO: task kworker/0:551:6449 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c3761000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:552:6451 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:552 state:D stack:0 pid:6451 tgid:6451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eced5d84 r8:00000002 r7:60000013 r6:eced5d8c r5:84e4d400 r4:84e4d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e4d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c8a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f12b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec877000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bf78c r4:858bf400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858bf78c r4:859c2800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e4d400 r8:859c282c r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2800 r8:8027ecf4 r7:eced1e60 r6:859c2880 r5:84e4d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced5fb0 to 0xeced5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859c8840 INFO: task kworker/0:552:6451 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c3a50000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:553:6453 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:553 state:D stack:0 pid:6453 tgid:6453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:84e4e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e4e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c8bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e4e000 r7:00000000 r6:83018000 r5:00001000 r4:7f12d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8d9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bfb8c r4:858bf800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858bfb8c r4:859c2900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e4e000 r8:859c292c r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2900 r8:8027ecf4 r7:eced5e60 r6:859c2980 r5:84e4e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced9fb0 to 0xeced9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859c8a00 INFO: task kworker/0:553:6453 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c3c84000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:554:6455 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:554 state:D stack:0 pid:6455 tgid:6455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecee5d84 r8:00000002 r7:60000113 r6:ecee5d8c r5:858d8000 r4:858d8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecee5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c8c80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f12f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8f3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bff8c r4:858bfc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858bff8c r4:859c2a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858d8000 r8:859c2a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2a00 r8:8027ecf4 r7:eced9e60 r6:85991d80 r5:858d8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecee5fb0 to 0xecee5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859c8b00 INFO: task kworker/0:554:6455 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c3c84000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:555:6457 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:555 state:D stack:0 pid:6457 tgid:6457 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eceedd84 r8:00000002 r7:60000113 r6:eceedd8c r5:858db000 r4:858db000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858db000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceede08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552d400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858db000 r7:00000000 r6:83018000 r5:00001000 r4:7f13f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec989000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f0f8c r4:859f0c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f0f8c r4:859c2a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858db000 r8:859c2aac r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2a80 r8:8027ecf4 r7:ecee5e60 r6:85991e00 r5:858db000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceedfb0 to 0xeceedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859c8b00 INFO: task kworker/0:555:6457 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c4163000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:556:6458 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:556 state:D stack:0 pid:6458 tgid:6458 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecef1d84 r8:00000002 r7:60000113 r6:ecef1d8c r5:858dbc00 r4:858dbc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858dbc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c8e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f131000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec913000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f038c r4:859f0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f038c r4:859c2b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858dbc00 r8:859c2b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2b00 r8:8027ecf4 r7:eceede60 r6:85991e80 r5:858dbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecef1fb0 to 0xecef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859c8cc0 INFO: task kworker/0:556:6458 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c4163000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:557:6460 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:557 state:D stack:0 pid:6460 tgid:6460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecef9d84 r8:00000002 r7:60000113 r6:ecef9d8c r5:858d9800 r4:858d9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ad140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f139000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec933000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f078c r4:859f0400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f078c r4:859c2b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858d9800 r8:859c2bac r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2b80 r8:8027ecf4 r7:eceede60 r6:85991f00 r5:858d9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecef9fb0 to 0xecef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859ad800 INFO: task kworker/0:557:6460 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c476f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:558:6462 blocked for more than 474 seconds. Workqueue: events bpf_prog_free_deferred [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858da400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:858da400 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f0b8c r4:859f0800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f0b8c r4:859c2c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858da400 r8:859c2c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2c00 r8:8027ecf4 r7:eceede60 r6:85991f80 r5:858da400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf01fb0 to 0xecf01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:859c8f80 INFO: task kworker/0:558:6462 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c476f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:559:6464 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:559 state:D stack:0 pid:6464 tgid:6464 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf09d84 r8:00000002 r7:60000113 r6:ecf09d8c r5:858dc800 r4:858dc800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858dc800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf09e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852501c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f145000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb0d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f1b8c r4:859f1800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f1b8c r4:859c2c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858dc800 r8:859c2cac r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2c80 r8:8027ecf4 r7:eceede60 r6:859ec000 r5:858dc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf09fb0 to 0xecf09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8552d4c0 INFO: task kworker/0:559:6464 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c476f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:560:6466 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:560 state:D stack:0 pid:6466 tgid:6466 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf11d84 r8:00000002 r7:60000013 r6:ecf11d8c r5:858dd400 r4:858dd400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858dd400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf11e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84567040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f141000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9ad000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f138c r4:859f1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f138c r4:859c2d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858dd400 r8:859c2d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2d00 r8:8027ecf4 r7:ecf09e60 r6:859ec080 r5:858dd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf11fb0 to 0xecf11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84567100 INFO: task kworker/0:560:6466 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c4c3f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:561:6468 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:561 state:D stack:0 pid:6468 tgid:6468 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eceddd84 r8:00000002 r7:60000013 r6:eceddd8c r5:84e4ec00 r4:84e4ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e4ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecedde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845674c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f143000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f178c r4:859f1400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f178c r4:859c2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e4ec00 r8:859c2dac r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2d80 r8:8027ecf4 r7:ecf09e60 r6:859c2e00 r5:84e4ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceddfb0 to 0xeceddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84567a40 INFO: task kworker/0:561:6468 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c4c3f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:562:6472 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:562 state:D stack:0 pid:6472 tgid:6472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf19d84 r8:00000002 r7:60000013 r6:ecf19d8c r5:84c50000 r4:84c50000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c50000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf19e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e05440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c50000 r7:00000000 r6:83018000 r5:00001000 r4:7f149000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb3d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f238c r4:859f2000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f238c r4:859c2e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c50000 r8:859c2eac r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2e80 r8:8027ecf4 r7:ecf09e60 r6:859c2f00 r5:84c50000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf19fb0 to 0xecf19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84567280 INFO: task kworker/0:562:6472 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c5859000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:563:6473 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:563 state:D stack:0 pid:6473 tgid:6473 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf21d84 r8:00000002 r7:60000013 r6:ecf21d8c r5:84c50c00 r4:84c50c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c50c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf21e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84562f80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c50c00 r7:00000000 r6:83018000 r5:00001000 r4:7f147000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f1f8c r4:859f1c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f1f8c r4:859c2f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c50c00 r8:859c2fac r7:82804d40 r6:dddced40 r5:dddced60 r4:859c2f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859c2f80 r8:8027ecf4 r7:ecf19e60 r6:85a2c000 r5:84c50c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf21fb0 to 0xecf21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85913580 INFO: task kworker/0:563:6473 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c5859000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:564:6474 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:564 state:D stack:0 pid:6474 tgid:6474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd91d84 r8:00000002 r7:60000013 r6:ecd91d8c r5:84c51800 r4:84c51800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c51800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd91e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a30040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c51800 r7:00000000 r6:83018000 r5:00001000 r4:7f153000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbb7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f278c r4:859f2400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f278c r4:85a2c080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c51800 r8:85a2c0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2c080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2c080 r8:8027ecf4 r7:ecf19e60 r6:85a2c100 r5:84c51800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd91fb0 to 0xecd91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85913580 INFO: task kworker/0:564:6474 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c5859000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:565:6477 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:565 state:D stack:0 pid:6477 tgid:6477 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf2dd84 r8:00000002 r7:60000113 r6:ecf2dd8c r5:858e1800 r4:858e1800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf2de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a301c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f157000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbcf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f2b8c r4:859f2800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f2b8c r4:85a2c180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e1800 r8:85a2c1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2c180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2c180 r8:8027ecf4 r7:ecd91e60 r6:859ec100 r5:858e1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf2dfb0 to 0xecf2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a30000 INFO: task kworker/0:565:6477 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c5859000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:566:6479 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:566 state:D stack:0 pid:6479 tgid:6479 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf35d84 r8:00000002 r7:60000013 r6:ecf35d8c r5:858e0000 r4:858e0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf35e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a302c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f159000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbe3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f2f8c r4:859f2c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f2f8c r4:85a2c200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e0000 r8:85a2c22c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2c200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2c200 r8:8027ecf4 r7:ecf2de60 r6:859ec180 r5:858e0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf35fb0 to 0xecf35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a30100 INFO: task kworker/0:566:6479 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c5ef4000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:567:6481 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:567 state:D stack:0 pid:6481 tgid:6481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf3dd84 r8:00000002 r7:60000113 r6:ecf3dd8c r5:858e0c00 r4:858e0c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e0c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf3de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a30680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f15f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f3b8c r4:859f3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f3b8c r4:85a2c280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e0c00 r8:85a2c2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2c280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2c280 r8:8027ecf4 r7:ecf35e60 r6:859ec200 r5:858e0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf3dfb0 to 0xecf3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a30240 INFO: task kworker/0:567:6481 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c6256000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:568:6482 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:568 state:D stack:0 pid:6482 tgid:6482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf25d84 r8:00000002 r7:60000113 r6:ecf25d8c r5:84c52400 r4:84c52400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c52400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf25e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a30380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c52400 r7:00000000 r6:83018000 r5:00001000 r4:7f15b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbf9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f338c r4:859f3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f338c r4:85a2c300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c52400 r8:85a2c32c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2c300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2c300 r8:8027ecf4 r7:ecf3de60 r6:85a2c380 r5:84c52400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf25fb0 to 0xecf25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a30240 INFO: task kworker/0:568:6482 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c6256000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:569:6485 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:569 state:D stack:0 pid:6485 tgid:6485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf41d84 r8:00000002 r7:60000113 r6:ecf41d8c r5:84c53000 r4:84c53000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c53000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf41e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a305c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c53000 r7:00000000 r6:83018000 r5:00001000 r4:7f15d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccd9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f378c r4:859f3400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f378c r4:85a2c400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c53000 r8:85a2c42c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2c400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2c400 r8:8027ecf4 r7:ecf3de60 r6:85a2c480 r5:84c53000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf41fb0 to 0xecf41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a30580 INFO: task kworker/0:569:6485 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c636c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:570:6486 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:570 state:D stack:0 pid:6486 tgid:6486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf29d84 r8:00000002 r7:60000013 r6:ecf29d8c r5:84c53c00 r4:84c53c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c53c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf29e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a30980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c53c00 r7:00000000 r6:83018000 r5:00001000 r4:7f163000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf4f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f838c r4:859f8000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f838c r4:85a2c500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c53c00 r8:85a2c52c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2c500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2c500 r8:8027ecf4 r7:ecf3de60 r6:85a2c580 r5:84c53c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf29fb0 to 0xecf29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a30840 INFO: task kworker/0:570:6486 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c636c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:571:6488 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:571 state:D stack:0 pid:6488 tgid:6488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf45d84 r8:00000002 r7:60000113 r6:ecf45d8c r5:84c54800 r4:84c54800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c54800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf45e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a308c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c54800 r7:00000000 r6:83018000 r5:00001000 r4:7f161000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccf9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f3f8c r4:859f3c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f3f8c r4:85a2c600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c54800 r8:85a2c62c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2c600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2c600 r8:8027ecf4 r7:ecf29e60 r6:85a2c680 r5:84c54800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf45fb0 to 0xecf45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a306c0 INFO: task kworker/0:571:6488 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c69f4000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:572:6491 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:572 state:D stack:0 pid:6491 tgid:6491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf49d84 r8:00000002 r7:60000113 r6:ecf49d8c r5:84c55400 r4:84c55400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c55400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf49e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a30ac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c55400 r7:00000000 r6:83018000 r5:00001000 r4:7f165000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf55000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f878c r4:859f8400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f878c r4:85a2c700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c55400 r8:85a2c72c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2c700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2c700 r8:8027ecf4 r7:ecf29e60 r6:85a2c780 r5:84c55400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf49fb0 to 0xecf49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a309c0 INFO: task kworker/0:572:6491 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c69f4000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:573:6493 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:573 state:D stack:0 pid:6493 tgid:6493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf59d84 r8:00000002 r7:60000113 r6:ecf59d8c r5:84c56c00 r4:84c56c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c56c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf59e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a41040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c56c00 r7:00000000 r6:83018000 r5:00001000 r4:7f169000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf65000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f8f8c r4:859f8c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f8f8c r4:85a2c800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c56c00 r8:85a2c82c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2c800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2c800 r8:8027ecf4 r7:ecf49e60 r6:85a2c880 r5:84c56c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf59fb0 to 0xecf59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a30b00 INFO: task kworker/0:573:6493 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c6f13000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:574:6495 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:574 state:D stack:0 pid:6495 tgid:6495 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf69d84 r8:00000002 r7:60000113 r6:ecf69d8c r5:85338c00 r4:85338c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85338c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf69e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a30d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85338c00 r7:00000000 r6:83018000 r5:00001000 r4:7f167000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf5f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f8b8c r4:859f8800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f8b8c r4:85a2c900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85338c00 r8:85a2c92c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2c900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2c900 r8:8027ecf4 r7:ecf59e60 r6:85a2c980 r5:85338c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf69fb0 to 0xecf69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a309c0 INFO: task kworker/0:574:6495 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c6f13000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:575:6497 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:575 state:D stack:0 pid:6497 tgid:6497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf71d84 r8:00000002 r7:60000113 r6:ecf71d8c r5:85338000 r4:85338000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85338000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf71e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a412c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85338000 r7:00000000 r6:83018000 r5:00001000 r4:7f16f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf73000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f938c r4:859f9000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f938c r4:85a2ca00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85338000 r8:85a2ca2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2ca00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2ca00 r8:8027ecf4 r7:ecf59e60 r6:85a2ca80 r5:85338000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf71fb0 to 0xecf71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a41100 INFO: task kworker/0:575:6497 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c6f13000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:576:6499 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:576 state:D stack:0 pid:6499 tgid:6499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf81d84 r8:00000002 r7:60000013 r6:ecf81d8c r5:8533b000 r4:8533b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8533b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf81e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a41440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8533b000 r7:00000000 r6:83018000 r5:00001000 r4:7f171000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf79000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f978c r4:859f9400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f978c r4:85a2cb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533b000 r8:85a2cb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2cb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2cb00 r8:8027ecf4 r7:ecf71e60 r6:85a2cb80 r5:8533b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf81fb0 to 0xecf81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a41280 INFO: task kworker/0:576:6499 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c74f4000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:577:6501 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:577 state:D stack:0 pid:6501 tgid:6501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf85d84 r8:00000002 r7:60000013 r6:ecf85d8c r5:858e3c00 r4:858e3c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf85e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a41680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1b7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf87000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f9b8c r4:859f9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f9b8c r4:85a2cc00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e3c00 r8:85a2cc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2cc00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2cc00 r8:8027ecf4 r7:ecf81e60 r6:859ec280 r5:858e3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf85fb0 to 0xecf85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a41380 INFO: task kworker/0:577:6501 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c77ec000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:578:6503 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:578 state:D stack:0 pid:6503 tgid:6503 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf95d84 r8:00000002 r7:60000113 r6:ecf95d8c r5:858e4800 r4:858e4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf95e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a41700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f1d1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f9f8c r4:859f9c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f9f8c r4:85a2cc80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e4800 r8:85a2ccac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2cc80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2cc80 r8:8027ecf4 r7:ecf85e60 r6:859ec300 r5:858e4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf95fb0 to 0xecf95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a41640 INFO: task kworker/0:578:6503 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c7a2b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:579:6505 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:579 state:D stack:0 pid:6505 tgid:6505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecfa1d84 r8:00000002 r7:60000013 r6:ecfa1d8c r5:858e6000 r4:858e6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfa1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a41900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f1d5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfa9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859fa78c r4:859fa400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859fa78c r4:85a2cd00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e6000 r8:85a2cd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2cd00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2cd00 r8:8027ecf4 r7:ecf95e60 r6:859ec380 r5:858e6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfa1fb0 to 0xecfa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a417c0 INFO: task kworker/0:579:6505 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c7a2b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:580:6508 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:580 state:D stack:0 pid:6508 tgid:6508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecfb9d84 r8:00000002 r7:60000113 r6:ecfb9d8c r5:858e5400 r4:858e5400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfb9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a41840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f1d3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfa3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859fa38c r4:859fa000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859fa38c r4:85a2cd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e5400 r8:85a2cdac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2cd80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2cd80 r8:8027ecf4 r7:ecfa1e60 r6:859ec400 r5:858e5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfb9fb0 to 0xecfb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a41740 INFO: task kworker/0:580:6508 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c7e1d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:581:6509 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:581 state:D stack:0 pid:6509 tgid:6509 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecfbdd84 r8:00000002 r7:60000113 r6:ecfbdd8c r5:858e3000 r4:858e3000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfbde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a41c80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f1d9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfc5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859faf8c r4:859fac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859faf8c r4:85a2ce00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e3000 r8:85a2ce2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2ce00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2ce00 r8:8027ecf4 r7:ecfa1e60 r6:859ec480 r5:858e3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfbdfb0 to 0xecfbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a41740 INFO: task kworker/0:581:6509 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c7e1d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:582:6510 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:582 state:D stack:0 pid:6510 tgid:6510 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecfc9d84 r8:00000002 r7:60000113 r6:ecfc9d8c r5:858e2400 r4:858e2400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfc9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a41a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f1d7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfbf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859fab8c r4:859fa800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859fab8c r4:85a2ce80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e2400 r8:85a2ceac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2ce80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2ce80 r8:8027ecf4 r7:ecfbde60 r6:859ec500 r5:858e2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfc9fb0 to 0xecfc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a41c00 INFO: task kworker/0:582:6510 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c7e1d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:583:6512 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:583 state:D stack:0 pid:6512 tgid:6512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecfd5d84 r8:00000002 r7:60000013 r6:ecfd5d8c r5:858de000 r4:858de000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858de000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfd5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a30c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858de000 r7:00000000 r6:83018000 r5:00001000 r4:7f1df000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecff3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859fbb8c r4:859fb800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859fbb8c r4:85a2cf00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858de000 r8:85a2cf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2cf00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2cf00 r8:8027ecf4 r7:ecfbde60 r6:859ec580 r5:858de000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfd5fb0 to 0xecfd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a41940 INFO: task kworker/0:583:6512 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c810a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:6514 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:584 state:D stack:0 pid:6514 tgid:6514 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecfe5d84 r8:00000002 r7:60000113 r6:ecfe5d8c r5:858e6c00 r4:858e6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfe5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a41d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1db000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfdb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859fb38c r4:859fb000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859fb38c r4:85a2cf80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e6c00 r8:85a2cfac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2cf80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2cf80 r8:8027ecf4 r7:ecfd5e60 r6:859ec600 r5:858e6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfe5fb0 to 0xecfe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a41c40 INFO: task kworker/0:584:6514 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c810a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:585:6516 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:585 state:D stack:0 pid:6516 tgid:6516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecfedd84 r8:00000002 r7:60000013 r6:ecfedd8c r5:858e8c00 r4:858e8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfede08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a41d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1dd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfe1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859fb78c r4:859fb400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859fb78c r4:85a50000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e8c00 r8:85a5002c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a50000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a50000 r8:8027ecf4 r7:ecfd5e60 r6:859ec680 r5:858e8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfedfb0 to 0xecfedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a41d00 INFO: task kworker/0:585:6516 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c87f1000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:586:6519 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:586 state:D stack:0 pid:6519 tgid:6519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecffdd84 r8:00000002 r7:60000013 r6:ecffdd8c r5:858e9800 r4:858e9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecffde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4f000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecff9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859fbf8c r4:859fbc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859fbf8c r4:85a50080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e9800 r8:85a500ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a50080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a50080 r8:8027ecf4 r7:ecfd5e60 r6:859ec700 r5:858e9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecffdfb0 to 0xecffdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a30f80 INFO: task kworker/0:586:6519 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c87f1000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:587:6521 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:587 state:D stack:0 pid:6521 tgid:6521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf91d84 r8:00000002 r7:60000113 r6:ecf91d8c r5:8533c800 r4:8533c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8533c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf91e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4f300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8533c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed009000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a0038c r4:85a00000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a0038c r4:85a50100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533c800 r8:85a5012c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a50100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a50100 r8:8027ecf4 r7:ecffde60 r6:85a50180 r5:8533c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf91fb0 to 0xecf91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a4f100 INFO: task kworker/0:587:6521 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c8b02000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:588:6524 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:588 state:D stack:0 pid:6524 tgid:6524 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed015d84 r8:00000002 r7:60000113 r6:ed015d8c r5:8533bc00 r4:8533bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8533bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed015e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4f880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8533bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f1ed000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed031000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a00b8c r4:85a00800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a00b8c r4:85a50200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533bc00 r8:85a5022c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a50200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a50200 r8:8027ecf4 r7:ecf91e60 r6:85a50280 r5:8533bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed015fb0 to 0xed015ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a4f200 INFO: task kworker/0:588:6524 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c8b02000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:589:6529 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:589 state:D stack:0 pid:6529 tgid:6529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed035d84 r8:00000002 r7:60000113 r6:ed035d8c r5:8533a400 r4:8533a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8533a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed035e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4f940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8533a400 r7:00000000 r6:83018000 r5:00001000 r4:7f1ef000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed03b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a00f8c r4:85a00c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a00f8c r4:85a50300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533a400 r8:85a5032c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a50300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a50300 r8:8027ecf4 r7:ed015e60 r6:85a50380 r5:8533a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed035fb0 to 0xed035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a4f840 INFO: task kworker/0:589:6529 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c8d67000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:6531 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:6531 tgid:6531 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecf4dd84 r8:00000002 r7:60000113 r6:ecf4dd8c r5:8533e000 r4:8533e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8533e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf4de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4fd40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8533e000 r7:00000000 r6:83018000 r5:00001000 r4:7f1f3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed04f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a0178c r4:85a01400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a0178c r4:85a50400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533e000 r8:85a5042c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a50400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a50400 r8:8027ecf4 r7:ed035e60 r6:85a50480 r5:8533e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf4dfb0 to 0xecf4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a4f980 INFO: task kworker/0:590:6531 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c8fda000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 r4:8533ec00 r5:8533ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed045e08 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:8533ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f1f1000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85a0138c r4:85a50500 r10:00000000 r9:85a50500 r8:8027ecf4 r7:ecf4de60 r6:85a50580 r5:8533ec00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8533d400 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed00de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4f700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8533d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb601000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a01f8c r4:85a01c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a01f8c r4:85a50600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533d400 r8:85a5062c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a50600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a50600 r8:8027ecf4 r7:ecf4de60 r6:85a50680 r5:8533d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed00dfb0 to 0xed00dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a4fcc0 INFO: task kworker/0:592:6535 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c93e1000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:593:6537 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:593 state:D stack:0 pid:6537 tgid:6537 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd79d84 r8:00000002 r7:60000113 r6:ecd79d8c r5:85339800 r4:85339800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85339800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd79e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4fec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85339800 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df971000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a01b8c r4:85a01800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a01b8c r4:85a50700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85339800 r8:85a5072c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a50700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a50700 r8:8027ecf4 r7:ed00de60 r6:85a50780 r5:85339800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd79fb0 to 0xecd79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a4fe00 INFO: task kworker/0:593:6537 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c952b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:594:6539 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:594 state:D stack:0 pid:6539 tgid:6539 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84c56000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85a0238c r4:85a02000 r10:61c88647 r9:84c56000 r8:85a5082c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 r4:82ac11e4 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:595:6541 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:595 state:D stack:0 pid:6541 tgid:6541 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ece11d84 r8:00000002 r7:60000013 r6:ece11d8c r5:84e80000 r4:84e80000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e80000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece11e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4e140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e80000 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd8d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a0278c r4:85a02400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a0278c r4:85a50900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e80000 r8:85a5092c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a50900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a50900 r8:8027ecf4 r7:ecdfde60 r6:85a50980 r5:84e80000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece11fb0 to 0xece11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a4e1c0 INFO: task kworker/0:595:6541 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c989f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:596 state:D stack:0 pid:6543 tgid:6543 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:597:6545 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:597 state:D stack:0 pid:6545 tgid:6545 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ece39d84 r8:00000002 r7:60000013 r6:ece39d8c r5:84e81800 r4:84e81800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e81800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece39e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4e480 r10:61c88647 r9:84e81800 r8:85a50b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a4e2c0 r4:00000000 r4:82ac11e4 r4:00000000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/0:598:6547 blocked for more than 475 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:598 state:D stack:0 pid:6547 tgid:6547 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ece4dd84 r8:00000002 r7:60000113 r6:ece4dd8c r5:84e82400 r4:84e82400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e82400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece4de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4e600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e82400 r7:00000000 r6:83018000 r5:00001000 r4:7f11d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec829000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a0338c r4:85a03000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a0338c r4:85a50c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e82400 r8:85a50c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a50c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a50c00 r8:8027ecf4 r7:ece39e60 r6:85a50c80 r5:84e82400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece4dfb0 to 0xece4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a4e3c0 INFO: task kworker/0:598:6547 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: c9e98000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:599:6549 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:599 state:D stack:0 pid:6549 tgid:6549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84e83c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed04de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4e980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e83c00 r7:00000000 r6:83018000 r5:00001000 r4:7f173000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec84d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a0378c r4:85a03400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a0378c r4:85a50d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e83c00 r8:85a50d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a50d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a50d00 r8:8027ecf4 r7:ece4de60 r6:85a50d80 r5:84e83c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 800f0113 ffffffff r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:84e84800 r5:84e84800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:84e84800 r7:00000000 r6:83018000 r5:00001000 r4:7f175000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9c5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a03b8c r4:85a03800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a03b8c r4:85a50e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e84800 r8:85a50e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a50e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a50e00 r8:8027ecf4 r7:ed04de60 r6:85a50e80 r5:84e84800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece65fb0 to 0xece65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a4e540 INFO: task kworker/0:600:6550 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ca0ed000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:601:6552 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:601 state:D stack:0 pid:6552 tgid:6552 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:858ebc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece6de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:858ebc00 r8:85a50f2c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:602:6555 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:602 state:D stack:0 pid:6555 tgid:6555 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed059d84 r8:00000002 r7:60000113 r6:ed059d8c r5:858ed400 r4:858ed400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858ed400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed059e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a46180 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f181000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca61000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a0cb8c r4:85a0c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a0cb8c r4:85a50f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858ed400 r8:85a50fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a50f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a50f80 r8:8027ecf4 r7:ece6de60 r6:859ec800 r5:858ed400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed059fb0 to 0xed059ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a4eb80 INFO: task kworker/0:602:6555 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ca7e3000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:603:6556 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:603 state:D stack:0 pid:6556 tgid:6556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed05dd84 r8:00000002 r7:60000113 r6:ed05dd8c r5:858ea400 r4:858ea400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858ea400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed05de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4ecc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f17b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca05000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a0c38c r4:85a0c000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a0c38c r4:85a5f000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858ea400 r8:85a5f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a5f000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5f000 r8:8027ecf4 r7:ed059e60 r6:859ec880 r5:858ea400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed05dfb0 to 0xed05dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 INFO: task kworker/0:604:6558 blocked for more than 475 seconds. r4:84e83000 r5:84e83000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4ee00 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a0c78c r4:85a0c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a0c78c r4:85a5f080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e83000 r8:85a5f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a5f080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5f080 r8:8027ecf4 r7:ed059e60 r6:85a5f100 r5:84e83000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece51fb0 to 0xece51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a4ed00 INFO: task kworker/0:604:6558 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: caa3f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:605:6562 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:605 state:D stack:0 pid:6562 tgid:6562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed061d84 r8:00000002 r7:60000113 r6:ed061d8c r5:84e86000 r4:84e86000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e86000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed061e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84db57c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e86000 r7:00000000 r6:83018000 r5:00001000 r4:7f185000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a0cf8c r4:85a0cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a0cf8c r4:85a5f180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e86000 r8:85a5f1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a5f180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: caabd000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r5:84ff7f8c r4:84ff7c00 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:606:6563 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:606 state:D stack:0 pid:6563 tgid:6563 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ece69d84 r8:00000002 r7:60000113 r6:ece69d8c r5:84e86c00 r4:84e86c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e86c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece69e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6a040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e86c00 r7:00000000 r6:83018000 r5:00001000 r4:7f187000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca9f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a0d38c r4:85a0d000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a0d38c r4:85a5f280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e86c00 r8:85a5f2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a5f280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5f280 r8:8027ecf4 r7:ed061e60 r6:85a5f300 r5:84e86c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece69fb0 to 0xece69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a4eac0 INFO: task kworker/0:606:6563 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: cad2e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:607:6566 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:607 state:D stack:0 pid:6566 tgid:6566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed069d84 r8:00000002 r7:60000113 r6:ed069d8c r5:84e85400 r4:84e85400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e85400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed069e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6a340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e85400 r7:00000000 r6:83018000 r5:00001000 r4:7f18d000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: caf63000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:608:6567 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:608 state:D stack:0 pid:6567 tgid:6567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed071d84 r8:00000002 r7:60000113 r6:ed071d8c r5:85ac0000 r4:85ac0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ac0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed071e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6a140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85ac0c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed075e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6a400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ac0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f18f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc0b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a0df8c r4:85a0dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a0df8c r4:85a5f580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ac0c00 r8:85a5f5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a5f580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5f580 r8:8027ecf4 r7:ed069e60 r6:85a5f600 r5:85ac0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed075fb0 to 0xed075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a6a300 INFO: task kworker/0:609:6570 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: cb38b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85ac1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed07de08 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85a6a440 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:e06cddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:611:6573 blocked for more than 475 seconds. Workqueue: events bpf_prog_free_deferred r5:85ac2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed06de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6adc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ac2400 r7:00000000 r6:83018000 r5:00001000 r4:7f19b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd71000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a0f38c r4:85a0f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a0f38c r4:85a5f780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ac2400 r8:85a5f7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a5f780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5f780 r8:8027ecf4 r7:ed07de60 r6:85a5f800 r5:85ac2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed06dfb0 to 0xed06dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a6a440 INFO: task kworker/0:611:6573 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: cb845000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:612:6576 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:612 state:D stack:0 pid:6576 tgid:6576 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85ac3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6a800 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85a5f880 r8:8027ecf4 r7:ed06de60 r6:85a5f900 r5:85ac3c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r5:800f0113 r4:80239bb0 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:613:6577 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:613 state:D stack:0 pid:6577 tgid:6577 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed089d84 r8:00000002 r7:60000113 r6:ed089d8c r5:85ac4800 r4:85ac4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ac4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed089e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6a900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ac4800 r7:00000000 r6:83018000 r5:00001000 r4:7f197000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc59000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a0eb8c r4:85a0e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a0eb8c r4:85a5f980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ac4800 r8:85a5f9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a5f980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5f980 r8:8027ecf4 r7:ed06de60 r6:85a5fa00 r5:85ac4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed089fb0 to 0xed089ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a6a7c0 INFO: task kworker/0:613:6577 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85ac5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xed08dfb0 to 0xed08dff8) Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:615:6581 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:615 state:D stack:0 pid:6581 tgid:6581 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed091d84 r8:00000002 r7:60000113 r6:ed091d8c r5:85ac6c00 r4:85ac6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ac6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed091e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6aec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ac6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f19f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd8b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a0f78c r4:85a0f400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a0f78c r4:85a5fb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ac6c00 r8:85a5fbac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a5fb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5fb80 r8:8027ecf4 r7:ed06de60 r6:85a5fc00 r5:85ac6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed091fb0 to 0xed091ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:85a6af40 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:ed095d84 r8:00000002 r7:60000013 r6:ed095d8c r5:85ac3000 r5:85ac3000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed095e08 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a6ae40 INFO: task kworker/0:616:6583 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: cc1c8000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:617:6585 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:617 state:D stack:0 pid:6585 tgid:6585 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed081d84 r8:00000002 r7:60000113 r6:ed081d8c r5:85ac6000 r4:85ac6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ac6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed081e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7c300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ac6000 r7:00000000 r6:83018000 r5:00001000 r4:7f1a5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecddd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1438c r4:85a14000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1438c r4:85a5fd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ac6000 r8:85a5fdac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a5fd80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5fd80 r8:8027ecf4 r7:ed095e60 r6:85a5fe00 r5:85ac6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed081fb0 to 0xed081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85a7c280 Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:84ff7f8c r4:84ff7c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85ac8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed099e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7c600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ac8000 r7:00000000 r6:83018000 r5:00001000 r4:7f1a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdeb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1478c r4:85a14400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1478c r4:85a5fe80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ac8000 r8:85a5feac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a5fe80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5fe80 r8:8027ecf4 r7:ed081e60 r6:85a5ff00 r5:85ac8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed099fb0 to 0xed099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a7c4c0 INFO: task kworker/0:618:6588 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: cc711000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:619:6590 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:619 state:D stack:0 pid:6590 tgid:6590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed09dd84 r8:00000002 r7:60000013 r6:ed09dd8c r5:85ac8c00 r4:85ac8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ac8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed09de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7c640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ac8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1ab000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdf5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a14b8c r4:85a14800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a14b8c r4:85a5ff80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ac8c00 r8:85a5ffac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a5ff80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5ff80 r8:8027ecf4 r7:ed099e60 r6:85a7f000 r5:85ac8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed09dfb0 to 0xed09dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a7c380 INFO: task kworker/0:619:6590 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: cc711000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:620:6592 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:620 state:D stack:0 pid:6592 tgid:6592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed0a1d84 r8:00000002 r7:60000013 r6:ed0a1d8c r5:85ac9800 r4:85ac9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ac9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0a1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7c740 r5:85a14f8c r4:85a14c00 r10:61c88647 r9:85ac9800 r8:85a7f0ac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:621:6594 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:621 state:D stack:0 pid:6594 tgid:6594 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed0a5d84 r8:00000002 r7:60000113 r6:ed0a5d8c r5:85aca400 r4:85aca400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aca400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0a5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7cbc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aca400 r7:00000000 r6:83018000 r5:00001000 r4:7f1bb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece3d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a15b8c r4:85a15800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a15b8c r4:85a7f180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aca400 r8:85a7f1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a7f180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7f180 r8:8027ecf4 r7:ed0a1e60 r6:85a7f200 r5:85aca400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0a5fb0 to 0xed0a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a7c6c0 INFO: task kworker/0:621:6594 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ccb43000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85acb000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85a7f280 r8:8027ecf4 r7:ed0a5e60 r6:85a7f300 r5:85acb000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85acbc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ece2f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1578c r4:85a15400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1578c r4:85a7f380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85acbc00 r8:85a7f3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a7f380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7f380 r8:8027ecf4 r7:ed0a5e60 r6:85a7f400 r5:85acbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0adfb0 to 0xed0adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a7c980 INFO: task kworker/0:623:6598 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: cd12e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:624:6600 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:624 state:D stack:0 pid:6600 tgid:6600 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed0b5d84 r8:00000002 r7:60000013 r6:ed0b5d8c r5:85acd400 r4:85acd400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85acd400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0b5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7ce80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85acd400 r7:00000000 r6:83018000 r5:00001000 r4:7f1bd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece53000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a15f8c r4:85a15c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a15f8c r4:85a7f480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85acd400 r8:85a7f4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a7f480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7f480 r8:8027ecf4 r7:ed0a5e60 r6:85a7f500 r5:85acd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0b5fb0 to 0xed0b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a7cb00 INFO: task kworker/0:624:6600 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: cd2dd000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:625:6602 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed0b9d84 r8:00000002 r7:60000113 r6:ed0b9d8c r5:85acec00 r4:85acec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85acec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0b9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a861c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85acec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1678c r4:85a16400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1678c r4:85a7f580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85acec00 r8:85a7f5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a7f580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7f580 r8:8027ecf4 r7:ed0b5e60 r6:85a7f600 r5:85acec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0b9fb0 to 0xed0b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a7ce40 INFO: task kworker/0:625:6602 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06cdfb0 to 0xe06cdff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:858eec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85a7f680 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85a6ad40 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 dd20: cd5e7000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:627:6609 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:627 state:D stack:0 pid:6609 tgid:6609 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebd1dd84 r8:00000002 r7:60000113 r6:ebd1dd8c r5:858ec800 r4:858ec800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858ec800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd1de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a862c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd19000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a16b8c r4:85a16800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a16b8c r4:85a7f700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858ec800 r8:85a7f72c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a7f700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7f700 r8:8027ecf4 r7:ed0b9e60 r6:859ec980 r5:858ec800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd1dfb0 to 0xebd1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a86280 INFO: task kworker/0:627:6609 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: cd946000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:858ee000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85a1778c r4:85a7f780 r4:85a7f780 r10:00000000 r9:85a7f780 r8:8027ecf4 r7:ebd1de60 r6:859eca00 r5:858ee000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec69dfb0 to 0xec69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a86480 INFO: task kworker/0:628:6611 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: cd946000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:629:6612 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:629 state:D stack:0 pid:6612 tgid:6612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec6a1d84 r8:00000002 r7:60000113 r6:ec6a1d8c r5:858eb000 r4:858eb000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858eb000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a864c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd23000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a16f8c r4:85a16c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a16f8c r4:85a7f800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858eb000 r8:85a7f82c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a7f800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7f800 r8:8027ecf4 r7:ec69de60 r6:859eca80 r5:858eb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6a1fb0 to 0xec6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a86480 INFO: task kworker/0:629:6612 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:630:6614 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:630 state:D stack:0 pid:6614 tgid:6614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec6a9d84 r8:00000002 r7:60000113 r6:ec6a9d8c r5:858d6c00 r4:858d6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a86580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd2d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1738c r4:85a17000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1738c r4:85a7f880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858d6c00 r8:85a7f8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a7f880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7f880 r8:8027ecf4 r7:ec69de60 r6:859ecb00 r5:858d6c00 r4:00000001 Exception stack(0xec6a9fb0 to 0xec6a9ff8) r4:85a86400 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ce029000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:631:6616 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:631 state:D stack:0 pid:6616 tgid:6616 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec6b1d84 r8:00000002 r7:60000113 r6:ec6b1d8c r5:858dec00 r4:858dec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858dec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:858dec00 r8:85a7f92c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:632:6618 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:632 state:D stack:0 pid:6618 tgid:6618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec6b9d84 r8:00000002 r7:60000113 r6:ec6b9d8c r5:858f0c00 r4:858f0c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858f0c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a86900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85a7f980 r8:8027ecf4 r7:ec6b1e60 r6:859ecc00 r5:858f0c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: ce20d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:633:6620 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:633 state:D stack:0 pid:6620 tgid:6620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec6d1d84 r8:00000002 r7:60000113 r6:ec6d1d8c r5:858f0000 r4:858f0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858f0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6d1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a869c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f127000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6bf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a17f8c r4:85a17c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a17f8c r4:85a7fa00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f0000 r8:85a7fa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a7fa00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7fa00 r8:8027ecf4 r7:ec6b1e60 r6:859ecc80 r5:858f0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6d1fb0 to 0xec6d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a868c0 INFO: task kworker/0:633:6620 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:82ac11e4 r4:e06cddc0 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ff7f8c r4:84ff7c00 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:829189c0 r9:ec6e5d84 r8:00000002 r7:60000113 r6:ec6e5d8c r5:858f3000 r5:858f3000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018005 r8:858f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f12b000 r5:85a2038c r4:85a20000 r7:dddced40 r6:83018000 r5:85a2038c r4:85a7fa80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f3000 r8:85a7faac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a7fa80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7fa80 r8:8027ecf4 r7:ec6b1e60 r6:859ecd00 r5:858f3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e5fb0 to 0xec6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a86a00 INFO: task kworker/0:634:6622 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ce613000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:635:6624 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:635 state:D stack:0 pid:6624 tgid:6624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec6f1d84 r8:00000002 r7:60000113 r6:ec6f1d8c r5:858f2400 r4:858f2400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858f2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f139000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec777000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2138c r4:85a21000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2138c r4:85a7fb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f2400 r8:85a7fb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a7fb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7fb00 r8:8027ecf4 r7:ec6b1e60 r6:859ecd80 r5:858f2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6f1fb0 to 0xec6f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a86b40 INFO: task kworker/0:635:6624 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ce613000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85004e00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:636:6626 blocked for more than 476 seconds. Call trace: r4:858f1800 r5:858f1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6fd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a20b8c r4:85a20800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a20b8c r4:85a7fb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f1800 r8:85a7fbac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a7fb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7fb80 r8:8027ecf4 r7:ec6f1e60 r6:859ece00 r5:858f1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec815fb0 to 0xec815ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a86ec0 INFO: task kworker/0:636:6626 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: cea6b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:637:6628 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:637 state:D stack:0 pid:6628 tgid:6628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec81dd84 r8:00000002 r7:60000113 r6:ec81dd8c r5:858f3c00 r4:858f3c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858f3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec81de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a86f00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f131000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec73f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a20f8c r4:85a20c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a20f8c r4:85a7fc00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f3c00 r8:85a7fc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a7fc00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7fc00 r8:8027ecf4 r7:ec6f1e60 r6:859ece80 r5:858f3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec81dfb0 to 0xec81dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a86d00 INFO: task kworker/0:637:6628 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: cec96000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:638:6630 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:638 state:D stack:0 pid:6630 tgid:6630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ece9dd84 r8:00000002 r7:60000113 r6:ece9dd8c r5:858f6000 r4:858f6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858f6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece9de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9b380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f143000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec81f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2238c r4:85a22000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2238c r4:85a7fc80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f6000 r8:85a7fcac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a7fc80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7fc80 r8:8027ecf4 r7:ec6f1e60 r6:859ecf00 r5:858f6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece9dfb0 to 0xece9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a86e40 INFO: task kworker/0:638:6630 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe06cdd20 to 0xe06cdd68) dd60: 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:639 state:D stack:0 pid:6633 tgid:6633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:858f6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858f6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf05e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9b040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec781000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2178c r4:85a21400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2178c r4:85a7fd00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f6c00 r8:85a7fd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a7fd00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7fd00 r8:8027ecf4 r7:ece9de60 r6:85a9f080 r5:858f6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf05fb0 to 0xecf05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a651c0 INFO: task kworker/0:639:6633 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: cf078000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:640:6636 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:640 state:D stack:0 pid:6636 tgid:6636 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecfb1d84 r8:00000002 r7:60000113 r6:ecfb1d8c r5:858f8000 r4:858f8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858f8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfb1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9b140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f13f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec793000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a21b8c r4:85a21800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a21b8c r4:85a7fd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f8000 r8:85a7fdac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a7fd80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7fd80 r8:8027ecf4 r7:ece9de60 r6:85a9f100 r5:858f8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfb1fb0 to 0xecfb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9b280 INFO: task kworker/0:640:6636 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:84ff7f8c r4:84ff7c00 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:641:6637 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:641 state:D stack:0 pid:6637 tgid:6637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecfcdd84 r8:00000002 r7:60000113 r6:ecfcdd8c r5:858f8c00 r4:858f8c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858f8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfcde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9b2c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f141000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec79d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a21f8c r4:85a21c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a21f8c r4:85a7fe00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f8c00 r8:85a7fe2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a7fe00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7fe00 r8:8027ecf4 r7:ece9de60 r6:85a9f180 r5:858f8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfcdfb0 to 0xecfcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9b100 INFO: task kworker/0:641:6637 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:e06cddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:84ff7f8c r4:84ff7c00 r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/0:642:6639 blocked for more than 476 seconds. r4:858fa400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858fa400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0c5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9b740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f149000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a22f8c r4:85a22c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a22f8c r4:85a7fe80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858fa400 r8:85a7feac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a7fe80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7fe80 r8:8027ecf4 r7:ece9de60 r6:85a9f200 r5:858fa400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0c5fb0 to 0xed0c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9b200 INFO: task kworker/0:642:6639 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: cfaed000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:643:6641 blocked for more than 476 seconds. r5:858f9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85a2278c r4:85a22400 r4:85a7ff00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:643:6641 is blocked on a mutex likely owned by task kworker/1:290:3848. r4:00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:e06cddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:644:6643 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:644 state:D stack:0 pid:6643 tgid:6643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed0d5d84 r8:00000002 r7:60000013 r6:ed0d5d8c r5:858fc800 r4:858fc800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858fc800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0d5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9b600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f147000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a22b8c r4:85a22800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a22b8c r4:85a7ff80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858fc800 r8:85a7ffac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a7ff80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7ff80 r8:8027ecf4 r7:ed0c5e60 r6:85a9f300 r5:858fc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0d5fb0 to 0xed0d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9b500 INFO: task kworker/0:644:6643 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d0029000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ff7f8c r4:84ff7c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:858fb000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0dde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9bb40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f15d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9bb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2378c r4:85a23400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2378c r4:85aa7000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858fb000 r8:85aa702c r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7000 r8:8027ecf4 r7:ed0c5e60 r6:85a9f380 r5:858fb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0ddfb0 to 0xed0ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9b640 INFO: task kworker/0:645:6645 is blocked on a mutex likely owned by task kworker/1:290:3848. r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:646 state:D stack:0 pid:6650 tgid:6650 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:858fbc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:858fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f15b000 r10:61c88647 r9:858fbc00 r8:85aa70ac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 r5:84ff7f8c r4:84ff7c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:858fe000 r5:858fe000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9bc80 r7:dddced40 r6:83018000 r5:85a23b8c r4:85aa7100 Exception stack(0xed0bdfb0 to 0xed0bdff8) INFO: task kworker/0:647:6653 is blocked on a mutex likely owned by task kworker/1:290:3848. r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:648:6655 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:648 state:D stack:0 pid:6655 tgid:6655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed0e5d84 r8:00000002 r7:60000013 r6:ed0e5d8c r5:84e28000 r4:84e28000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e28000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0e5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a99200 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e28000 r7:00000000 r6:83018000 r5:00001000 r4:7f169000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2438c r4:85a24000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2438c r4:85aa7180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e28000 r8:85aa71ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7180 r8:8027ecf4 r7:ed0bde60 r6:85aa7200 r5:84e28000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0e5fb0 to 0xed0e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9bcc0 INFO: task kworker/0:648:6655 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d054a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:649:6659 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:649 state:D stack:0 pid:6659 tgid:6659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed0f5d84 r8:00000002 r7:60000113 r6:ed0f5d8c r5:84e29800 r4:84e29800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e29800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0f5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a99000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e29800 r7:00000000 r6:83018000 r5:00001000 r4:7f167000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a23f8c r4:85a23c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a23f8c r4:85aa7280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e29800 r8:85aa72ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7280 r8:8027ecf4 r7:ed0e5e60 r6:85aa7300 r5:84e29800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0f5fb0 to 0xed0f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9bf00 INFO: task kworker/0:649:6659 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d054a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:650:6661 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:650 state:D stack:0 pid:6661 tgid:6661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed0f1d84 r8:00000002 r7:60000013 r6:ed0f1d8c r5:84e2a400 r4:84e2a400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e2a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0f1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a993c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e2a400 r7:00000000 r6:83018000 r5:00001000 r4:7f16f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecce5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2478c r4:85a24400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2478c r4:85aa7380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e2a400 r8:85aa73ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7380 r8:8027ecf4 r7:ed0e5e60 r6:85aa7400 r5:84e2a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0f1fb0 to 0xed0f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a99340 INFO: task kworker/0:650:6661 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:82ac11e4 r4:e06cddc0 r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) INFO: task kworker/0:651:6664 blocked for more than 476 seconds. r5:84e2b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85aa7480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7480 r8:8027ecf4 r7:ed0f1e60 r6:85aa7500 r5:84e2b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0e1fb0 to 0xed0e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a99380 INFO: task kworker/0:651:6664 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d0ff0000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/0:652 state:D stack:0 pid:6666 tgid:6666 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84e2c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0e9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a24b8c r4:85a24800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a24b8c r4:85aa7580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e2c800 r8:85aa75ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7580 r8:8027ecf4 r7:ed0e1e60 r6:85aa7600 r5:84e2c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0e9fb0 to 0xed0e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a994c0 INFO: task kworker/0:652:6666 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d0ff0000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84e2bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a99cc0 r7:dddced40 r6:83018000 r5:85a2578c r4:85aa7700 Exception stack(0xed101fb0 to 0xed101ff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:654 state:D stack:0 pid:6670 tgid:6670 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:858fd400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018005 r8:858fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c5000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2538c r4:85a25000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2538c r4:85aa7800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858fd400 r8:85aa782c r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7800 r8:8027ecf4 r7:ed101e60 r6:85a9f500 r5:858fd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0f9fb0 to 0xed0f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a99640 INFO: task kworker/0:654:6670 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d136f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:655:6674 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:655 state:D stack:0 pid:6674 tgid:6674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed0fdd84 r8:00000002 r7:60000013 r6:ed0fdd8c r5:858fec00 r4:858fec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858fec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0fde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a99d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f1cd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecefd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:656:6676 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:656 state:D stack:0 pid:6676 tgid:6676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed109d84 r8:00000002 r7:60000113 r6:ed109d8c r5:858e8000 r4:858e8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858e8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed109e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a99c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb785000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2638c r4:85a26000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2638c r4:85aa7900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858e8000 r8:85aa792c r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7900 r8:8027ecf4 r7:ed0fde60 r6:85a9f600 r5:858e8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed109fb0 to 0xed109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a99c00 INFO: task kworker/0:656:6676 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d19bc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:657:6677 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:657 state:D stack:0 pid:6677 tgid:6677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed10dd84 r8:00000002 r7:60000013 r6:ed10dd8c r5:858f5400 r4:858f5400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858f5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed10de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 r5:00001000 r4:df997000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a25f8c r4:85aa7980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f5400 r8:85aa79ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7980 r8:8027ecf4 r7:ed109e60 r6:85a9f680 r5:858f5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed10dfb0 to 0xed10dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a99f80 INFO: task kworker/0:657:6677 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d19bc000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:658:6680 blocked for more than 476 seconds. r4:84cf0c00 r5:84cf0c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed115e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 r5:84ff7f8c r4:84ff7c00 r4:85004e00 r4:00000001 Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:659:6683 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:659 state:D stack:0 pid:6683 tgid:6683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed105d84 r8:00000002 r7:60000113 r6:ed105d8c r5:84e2e000 r4:84e2e000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e2e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed105e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9e300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e2e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec823000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a26f8c r4:85a26c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a26f8c r4:85aa7a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e2e000 r8:85aa7aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7a80 r8:8027ecf4 r7:ed115e60 r6:85aa7b00 r5:84e2e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed105fb0 to 0xed105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9e280 INFO: task kworker/0:659:6683 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d1ab4000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:660:6684 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:660 state:D stack:0 pid:6684 tgid:6684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed121d84 r8:00000002 r7:60000013 r6:ed121d8c r5:84cf1800 r4:84cf1800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cf1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed121e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9e140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cf1800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec65d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a26b8c r4:85a26800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a26b8c r4:85aa7b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cf1800 r8:85aa7bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7b80 r8:8027ecf4 r7:ed105e60 r6:85a9f780 r5:84cf1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed121fb0 to 0xed121ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9e100 INFO: task kworker/0:660:6684 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d208a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:661:6686 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:661 state:D stack:0 pid:6686 tgid:6686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed129d84 r8:00000002 r7:60000113 r6:ed129d8c r5:84cf2400 r4:84cf2400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cf2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed129e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9e740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cf2400 r7:00000000 r6:83018000 r5:00001000 r4:7f11d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca13000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a27b8c r4:85a27800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a27b8c r4:85aa7c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cf2400 r8:85aa7c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7c00 r8:8027ecf4 r7:ed105e60 r6:85a9f800 r5:84cf2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed129fb0 to 0xed129ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9e2c0 INFO: task kworker/0:661:6686 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d208a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:662:6687 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:662 state:D stack:0 pid:6687 tgid:6687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed12dd84 r8:00000002 r7:60000013 r6:ed12dd8c r5:84cf3000 r4:84cf3000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cf3000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed12de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cf3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec84f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2738c r4:85a27000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2738c r4:85aa7c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cf3000 r8:85aa7cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7c80 r8:8027ecf4 r7:ed129e60 r6:85a9f880 r5:84cf3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed12dfb0 to 0xed12dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9e2c0 INFO: task kworker/0:662:6687 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d237a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:663:6689 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:663 state:D stack:0 pid:6689 tgid:6689 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed119d84 r8:00000002 r7:60000113 r6:ed119d8c r5:84e2ec00 r4:84e2ec00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e2ec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed119e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9e5c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84e2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9e3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2778c r4:85a27400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2778c r4:85aa7d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e2ec00 r8:85aa7d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7d00 r8:8027ecf4 r7:ed129e60 r6:85aa7d80 r5:84e2ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed119fb0 to 0xed119ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9e400 INFO: task kworker/0:663:6689 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d23ca000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:664:6692 blocked for more than 477 seconds. r4:84e2d400 r5:84e2d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed131e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9eb80 r5:00001000 r4:ecab7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5c78c r4:85b5c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5c78c r4:85aa7e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e2d400 r8:85aa7e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7e00 r8:8027ecf4 r7:ed129e60 r6:85aa7e80 r5:84e2d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed131fb0 to 0xed131ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9e680 INFO: task kworker/0:664:6692 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d23ca000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e28c00 r5:84e28c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed135e08 r4:00000000 r5:00001000 r4:eca59000 r5:85a27f8c r4:85a27c00 r7:dddced40 r6:83018000 r5:85a27f8c r4:85aa7f00 r4:00000001 Exception stack(0xed135fb0 to 0xed135ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d2903000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:666:6695 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:666 state:D stack:0 pid:6695 tgid:6695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed111d84 r8:00000002 r7:60000113 r6:ed111d8c r5:85ace000 r4:85ace000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ace000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed111e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9e9c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ace000 r7:00000000 r6:83018000 r5:00001000 r4:7f175000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca8f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5c38c r4:85b5c000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5c38c r4:85aa7680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ace000 r8:85aa76ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85aa7680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa7680 r8:8027ecf4 r7:ed131e60 r6:85b24000 r5:85ace000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed111fb0 to 0xed111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9e800 INFO: task kworker/0:666:6695 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d2a99000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:667:6698 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:667 state:D stack:0 pid:6698 tgid:6698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed13dd84 r8:00000002 r7:60000113 r6:ed13dd8c r5:85acc800 r4:85acc800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85acc800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed13de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9ed00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85acc800 r7:00000000 r6:83018000 r5:00001000 r4:7f17b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaf3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5cb8c r4:85b5c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5cb8c r4:85b24080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85acc800 r8:85b240ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b24080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24080 r8:8027ecf4 r7:ed131e60 r6:85b24100 r5:85acc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed13dfb0 to 0xed13dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a9eb40 INFO: task kworker/0:667:6698 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d2a99000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85350000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:85350000 r7:00000000 r6:83018000 r5:00001000 r4:7f17d000 r4:85b24180 Exception stack(0xed145fb0 to 0xed145ff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:85350c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed149e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2d040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85350c00 r7:00000000 r6:83018000 r5:00001000 r4:7f185000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc6b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5d78c r4:85b5d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5d78c r4:85b24280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85350c00 r8:85b242ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b24280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24280 r8:8027ecf4 r7:ed145e60 r6:85b24300 r5:85350c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed149fb0 to 0xed149ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a99740 INFO: task kworker/0:669:6703 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 dd60: 800f0113 ffffffff r4:e06cddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85351800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r9:83018005 r8:85351800 r7:00000000 r6:83018000 r5:00001000 r4:7f181000 r10:61c88647 r9:85351800 r8:85b243ac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d3352000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:671:6707 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:671 state:D stack:0 pid:6707 tgid:6707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed14dd84 r8:00000002 r7:60000113 r6:ed14dd8c r5:85352400 r4:85352400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85352400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed14de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2d140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85352400 r7:00000000 r6:83018000 r5:00001000 r4:7f187000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5db8c r4:85b5d800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5db8c r4:85b24480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85352400 r8:85b244ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b24480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24480 r8:8027ecf4 r7:ed149e60 r6:85b24500 r5:85352400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed14dfb0 to 0xed14dff8) dfa0: 00000000 00000000 00000000 00000000 r4:85b2d280 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:00000000 r5:00001000 r4:dfd83000 r5:84ff7f8c r4:84ff7c00 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:672:6708 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:672 state:D stack:0 pid:6708 tgid:6708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed155d84 r8:00000002 r7:60000013 r6:ed155d8c r5:85353000 r4:85353000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85353000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed155e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2d340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85353000 r7:00000000 r6:83018000 r5:00001000 r4:7f18b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdbf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5df8c r4:85b5dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5df8c r4:85b24580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85353000 r8:85b245ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b24580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24580 r8:8027ecf4 r7:ed14de60 r6:85b24600 r5:85353000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed155fb0 to 0xed155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2d100 INFO: task kworker/0:672:6708 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d39a4000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:673:6710 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:673 state:D stack:0 pid:6710 tgid:6710 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed159d84 r8:00000002 r7:60000113 r6:ed159d8c r5:85353c00 r4:85353c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85353c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed159e08 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2d400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85353c00 r7:00000000 r6:83018000 r5:00001000 r4:7f18d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdd5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5e38c r4:85b5e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5e38c r4:85b24680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85353c00 r8:85b246ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b24680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24680 r8:8027ecf4 r7:ed155e60 r6:85b24700 r5:85353c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed159fb0 to 0xed159ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2d300 INFO: task kworker/0:673:6710 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d39a4000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:674:6711 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:674 state:D stack:0 pid:6711 tgid:6711 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85355400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed151e08 r4:00000000 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:85355400 r7:00000000 r6:83018000 r5:00001000 r4:7f1a1000 r5:85b5f78c r4:85b5f400 r10:61c88647 r9:85355400 r8:85b247ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d3ce6000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:675:6714 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:675 state:D stack:0 pid:6714 tgid:6714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed165d84 r8:00000002 r7:60000013 r6:ed165d8c r5:85354800 r4:85354800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85354800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed165e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2d800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85354800 r7:00000000 r6:83018000 r5:00001000 r4:7f191000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece03000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85b24880 r8:8027ecf4 r7:ed151e60 r6:85b24900 r5:85354800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:00000000 r5:00001000 r4:dfd83000 r5:84ff7f8c r4:84ff7c00 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:676:6717 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:676 state:D stack:0 pid:6717 tgid:6717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed161d84 r8:00000002 r7:60000113 r6:ed161d8c r5:85356c00 r4:85356c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85356c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed161e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2d9c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85356c00 r7:00000000 r6:83018000 r5:00001000 r4:7f193000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece1b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5eb8c r4:85b5e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5eb8c r4:85b24980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85356c00 r8:85b249ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b24980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24980 r8:8027ecf4 r7:ed151e60 r6:85b24a00 r5:85356c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed161fb0 to 0xed161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2d940 INFO: task kworker/0:676:6717 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d4220000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r4:85004e00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:677 state:D stack:0 pid:6718 tgid:6718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed15dd84 r8:00000002 r7:60000013 r6:ed15dd8c r5:85ae0000 r4:85ae0000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ae0000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed15de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2da40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae0000 r7:00000000 r6:83018000 r5:00001000 r4:7f197000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece31000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5ef8c r4:85b5ec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5ef8c r4:85b24a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae0000 r8:85b24aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b24a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24a80 r8:8027ecf4 r7:ed151e60 r6:85b24b00 r5:85ae0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed15dfb0 to 0xed15dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2da80 INFO: task kworker/0:677:6718 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d455e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:84cf3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed169e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84cf3c00 r8:85b24bac r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:678:6720 is blocked on a mutex likely owned by task kworker/1:290:3848. dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 Exception stack(0xe06cdfb0 to 0xe06cdff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84cf5400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:84cf5400 r7:00000000 r6:83018000 r5:00001000 r4:7f1a5000 r5:85b5fb8c r4:85b5f800 r7:dddced40 r6:83018000 r5:85b5fb8c r4:85b24c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed16dfb0 to 0xed16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2df00 INFO: task kworker/0:679:6725 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d4744000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:680:6727 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:680 state:D stack:0 pid:6727 tgid:6727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:84cf6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed175e08 r9:83018005 r8:84cf6000 r7:00000000 r6:83018000 r5:00001000 r4:7f1a9000 r4:85b24c80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06cdfb0 to 0xe06cdff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:681 state:D stack:0 pid:6729 tgid:6729 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed179d84 r8:00000002 r7:60000013 r6:ed179d8c r5:84cf6c00 r4:84cf6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84cf6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed179e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b31300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cf6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1ad000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf5b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba038c r4:85ba0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba038c r4:85b24d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cf6c00 r8:85b24d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b24d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24d00 r8:8027ecf4 r7:ed175e60 r6:85a9fa80 r5:84cf6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed179fb0 to 0xed179ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b31100 INFO: task kworker/0:681:6729 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d4dab000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:682 state:D stack:0 pid:6732 tgid:6732 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84cf0000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed171e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b31640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84cf0000 r7:00000000 r6:83018000 r5:00001000 r4:7f1bb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba0b8c r4:85ba0800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba0b8c r4:85b24d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cf0000 r8:85b24dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b24d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24d80 r8:8027ecf4 r7:ed179e60 r6:85a9fb00 r5:84cf0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed171fb0 to 0xed171ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85b312c0 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:683:6733 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:683 state:D stack:0 pid:6733 tgid:6733 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84cf4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xed181fb0 to 0xed181ff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:684 state:D stack:0 pid:6737 tgid:6737 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85b60000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed17de08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85b24e80 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b31600 INFO: task kworker/0:684:6737 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d56ee000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:685:6739 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:685 state:D stack:0 pid:6739 tgid:6739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed18dd84 r8:00000002 r7:60000013 r6:ed18dd8c r5:85b61800 r4:85b61800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b61800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed18de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xed18dfb0 to 0xed18dff8) INFO: task kworker/0:685:6739 is blocked on a mutex likely owned by task kworker/1:290:3848. [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:686 state:D stack:0 pid:6741 tgid:6741 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85b63000 r4:829189bc r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b24f80 r8:8027ecf4 r7:ed18de60 r6:85a9fd00 r5:85b63000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed195fb0 to 0xed195ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b31b00 INFO: task kworker/0:686:6741 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d60ca000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:687:6743 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:687 state:D stack:0 pid:6743 tgid:6743 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85b63c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed19de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba178c r4:85ba1400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba178c r4:85b33000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b63c00 r8:85b3302c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33000 r8:8027ecf4 r7:ed18de60 r6:85a9fd80 r5:85b63c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed19dfb0 to 0xed19dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b31800 INFO: task kworker/0:687:6743 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d62ae000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:688:6744 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:688 state:D stack:0 pid:6744 tgid:6744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed1a1d84 r8:00000002 r7:60000013 r6:ed1a1d8c r5:85b62400 r4:85b62400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b62400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1a1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b31b80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b62400 r7:00000000 r6:83018000 r5:00001000 r4:7f1d3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba1b8c r4:85ba1800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba1b8c r4:85b33080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b62400 r8:85b330ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33080 r8:8027ecf4 r7:ed18de60 r6:85a9fe00 r5:85b62400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1a1fb0 to 0xed1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b31800 INFO: task kworker/0:688:6744 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d62ae000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:689:6746 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:689 state:D stack:0 pid:6746 tgid:6746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed1a9d84 r8:00000002 r7:60000113 r6:ed1a9d8c r5:85b60c00 r4:85b60c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b60c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1a9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b31c80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b60c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1d5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfdd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba1f8c r4:85ba1c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba1f8c r4:85b33100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b60c00 r8:85b3312c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33100 r8:8027ecf4 r7:ed18de60 r6:85a9fe80 r5:85b60c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1a9fb0 to 0xed1a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b31b40 INFO: task kworker/0:689:6746 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d67d8000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:690:6749 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:690 state:D stack:0 pid:6749 tgid:6749 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed1add84 r8:00000002 r7:60000013 r6:ed1add8c r5:85b65400 r4:85b65400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b65400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1ade08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b31ec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b65400 r7:00000000 r6:83018000 r5:00001000 r4:7f1d9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecff5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba278c r4:85ba2400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba278c r4:85b33180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b65400 r8:85b331ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33180 r8:8027ecf4 r7:ed18de60 r6:85a9ff00 r5:85b65400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1adfb0 to 0xed1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b31d80 INFO: task kworker/0:690:6749 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d67d8000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:691:6750 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:691 state:D stack:0 pid:6750 tgid:6750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed1b1d84 r8:00000002 r7:60000113 r6:ed1b1d8c r5:85b66000 r4:85b66000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b66000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1b1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b66000 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebded000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba378c r4:85ba3400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba378c r4:85b33200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b66000 r8:85b3322c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33200 r8:8027ecf4 r7:ed1ade60 r6:85a9ff80 r5:85b66000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1b1fb0 to 0xed1b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b31f00 INFO: task kworker/0:691:6750 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d6930000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:692:6754 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:692 state:D stack:0 pid:6754 tgid:6754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed185d84 r8:00000002 r7:60000013 r6:ed185d8c r5:85b66c00 r4:85b66c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b66c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed185e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9be40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b66c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba17000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba2b8c r4:85ba2800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba2b8c r4:85b33280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b66c00 r8:85b332ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33280 r8:8027ecf4 r7:ed1b1e60 r6:85b3c000 r5:85b66c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed185fb0 to 0xed185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b311c0 INFO: task kworker/0:692:6754 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d6930000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:693:6756 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:693 state:D stack:0 pid:6756 tgid:6756 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed189d84 r8:00000002 r7:60000113 r6:ed189d8c r5:85b64800 r4:85b64800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b64800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed189e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c180 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b64800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd1f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba2f8c r4:85ba2c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba2f8c r4:85b33300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b64800 r8:85b3332c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33300 r8:8027ecf4 r7:ed1b1e60 r6:85b3c080 r5:85b64800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed189fb0 to 0xed189ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a654c0 INFO: task kworker/0:693:6756 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d7009000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:694:6759 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:694 state:D stack:0 pid:6759 tgid:6759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed025d84 r8:00000002 r7:60000113 r6:ed025d8c r5:85b68c00 r4:85b68c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b68c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed025e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b68c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd2b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba338c r4:85ba3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba338c r4:85b33380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b68c00 r8:85b333ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33380 r8:8027ecf4 r7:ed1b1e60 r6:85b3c100 r5:85b68c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed025fb0 to 0xed025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2c140 INFO: task kworker/0:694:6759 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d71bf000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:695:6762 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:695 state:D stack:0 pid:6762 tgid:6762 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85b6a400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:696:6763 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:696 state:D stack:0 pid:6763 tgid:6763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed1b9d84 r8:00000002 r7:60000013 r6:ed1b9d8c r5:85b69800 r4:85b69800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b69800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1b9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b69800 r7:00000000 r6:83018000 r5:00001000 r4:7f123000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec67d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba3b8c r4:85ba3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba3b8c r4:85b33480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b69800 r8:85b334ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33480 r8:8027ecf4 r7:ed1b5e60 r6:85b3c200 r5:85b69800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1b9fb0 to 0xed1b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2c5c0 INFO: task kworker/0:696:6763 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d7688000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e06cddc0 r4:00000000 r5:00001000 r4:dfd83000 r5:84ff7f8c r4:84ff7c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85b68000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1c1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b68000 r7:00000000 r6:83018000 r5:00001000 r4:7f125000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6a3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba3f8c r4:85ba3c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba3f8c r4:85b33500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b68000 r8:85b3352c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33500 r8:8027ecf4 r7:ed1b5e60 r6:85b3c280 r5:85b68000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c1fb0 to 0xed1c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2c400 INFO: task kworker/0:697:6765 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d7688000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:698:6767 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:698 state:D stack:0 pid:6767 tgid:6767 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85b6c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1c9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b6c800 r7:00000000 r6:83018000 r5:00001000 r4:7f127000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6ad000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba438c r4:85ba4000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba438c r4:85b33580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b6c800 r8:85b335ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33580 r8:8027ecf4 r7:ed1b5e60 r6:85b3c300 r5:85b6c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c9fb0 to 0xed1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2c880 INFO: task kworker/0:698:6767 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d786b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r5:800f0113 r4:80239bb0 r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:699:6769 blocked for more than 477 seconds. r5:85ae2400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c8c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae2400 r7:00000000 r6:83018000 r5:00001000 r4:7f12b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6bb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba478c r4:85ba4400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba478c r4:85b33600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae2400 r8:85b3362c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33600 r8:8027ecf4 r7:ed1b5e60 r6:85b33680 r5:85ae2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6d9fb0 to 0xec6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2c6c0 INFO: task kworker/0:699:6769 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/0:700:6772 blocked for more than 477 seconds. r5:85ae3000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r5:85ba4b8c r4:85ba4800 r10:00000000 r9:85b33700 r8:8027ecf4 r7:ed1b5e60 r6:85b33780 r5:85ae3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1cdfb0 to 0xed1cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2c980 INFO: task kworker/0:700:6772 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d7c0c000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:701:6773 blocked for more than 477 seconds. r5:85ae3c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85ba538c r4:85ba5000 r4:85b33800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:85ae4800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ae4800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1d9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b47040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae4800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec77d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba5b8c r4:85ba5800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba5b8c r4:85b33900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae4800 r8:85b3392c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33900 r8:8027ecf4 r7:ed1d5e60 r6:85b33980 r5:85ae4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1d9fb0 to 0xed1d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b2cd00 INFO: task kworker/0:702:6776 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d8108000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:703 state:D stack:0 pid:6778 tgid:6778 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85ae5400 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1dde08 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85ae5400 r8:85b33a2c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:704:6780 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:704 state:D stack:0 pid:6780 tgid:6780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed1e1d84 r8:00000002 r7:60000113 r6:ed1e1d8c r5:85ae6000 r4:85ae6000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ae6000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1e1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b471c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae6000 r7:00000000 r6:83018000 r5:00001000 r4:7f13f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec795000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba5f8c r4:85ba5c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba5f8c r4:85b33b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae6000 r8:85b33b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33b00 r8:8027ecf4 r7:ed1d9e60 r6:85b33b80 r5:85ae6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1e1fb0 to 0xed1e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b47300 INFO: task kworker/0:704:6780 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:705:6782 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:705 state:D stack:0 pid:6782 tgid:6782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed1e5d84 r8:00000002 r7:60000113 r6:ed1e5d8c r5:85ae6c00 r4:85ae6c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ae6c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1e5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b47380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f141000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7cd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba638c r4:85ba6000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba638c r4:85b33c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae6c00 r8:85b33c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33c00 r8:8027ecf4 r7:ed1e1e60 r6:85b33c80 r5:85ae6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1e5fb0 to 0xed1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b47180 INFO: task kworker/0:705:6782 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d8722000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:706:6784 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:85ae1800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1e9e08 r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85ba678c r4:85ba6400 r7:dddced40 r6:83018000 r5:85ba678c r4:85b33d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85b47340 INFO: task kworker/0:706:6784 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d886e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:707:6786 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:707 state:D stack:0 pid:6786 tgid:6786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed1edd84 r8:00000002 r7:60000113 r6:ed1edd8c r5:85ae0c00 r4:85ae0c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ae0c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1ede08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85356000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1f1e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b479c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85356000 r7:00000000 r6:83018000 r5:00001000 r4:7f149000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8ed000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba738c r4:85ba7000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba738c r4:85b33f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85356000 r8:85b33f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b33f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b33f00 r8:8027ecf4 r7:ed1ede60 r6:85b33f80 r5:85356000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1f1fb0 to 0xed1f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b475c0 INFO: task kworker/0:708:6788 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d8b81000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:709:6791 blocked for more than 478 seconds. r4:85368000 r5:85368000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:85bac38c r4:85bac000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:709:6791 is blocked on a mutex likely owned by task kworker/1:290:3848. dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:e06cddc0 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8536a400 r5:8536a400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed201e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b47dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8536a400 r7:00000000 r6:83018000 r5:00001000 r4:7f167000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb23000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba7b8c r4:85ba7800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ba7b8c r4:85b53100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8536a400 r8:85b5312c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b53100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b53100 r8:8027ecf4 r7:ed1f5e60 r6:85b53180 r5:8536a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed201fb0 to 0xed201ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b47d80 INFO: task kworker/0:710:6796 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d8e45000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85369800 r5:85369800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85369800 r8:85b5322c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xed1fdfb0 to 0xed1fdff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:712:6799 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:712 state:D stack:0 pid:6799 tgid:6799 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed209d84 r8:00000002 r7:60000113 r6:ed209d8c r5:85368c00 r4:85368c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85368c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed209e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b54240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85368c00 r7:00000000 r6:83018000 r5:00001000 r4:7f171000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccd7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bac78c r4:85bac400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bac78c r4:85b53300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85368c00 r8:85b5332c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b53300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b53300 r8:8027ecf4 r7:ed1f5e60 r6:85b53380 r5:85368c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed209fb0 to 0xed209ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b54080 Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8536bc00 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed205fb0 to 0xed205ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b54200 INFO: task kworker/0:713:6803 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d9991000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:714:6805 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:714 state:D stack:0 pid:6805 tgid:6805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed20dd84 r8:00000002 r7:60000113 r6:ed20dd8c r5:8536c800 r4:8536c800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8536c800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed20de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:8536c800 r8:85b5352c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8501e100 task:kworker/0:715 state:D stack:0 pid:6806 tgid:6806 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829189c0 r9:ed1f9d84 r8:00000002 r7:60000113 r6:ed1f9d8c r5:8536d400 r4:8536d400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8536d400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1f9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b54500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8536d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecea5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bacf8c r4:85bacc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bacf8c r4:85b53600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8536d400 r8:85b5362c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b53600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b53600 r8:8027ecf4 r7:ed20de60 r6:85b53680 r5:8536d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1f9fb0 to 0xed1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b54340 INFO: task kworker/0:715:6806 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: d9b8e000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r4:8536e000 r5:8536e000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed215e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b54900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8536e000 r7:00000000 r6:83018000 r5:00001000 r4:7f1dd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecee7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bad78c r4:85bad400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bad78c r4:85b53700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8536e000 r8:85b5372c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xed215fb0 to 0xed215ff8) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfa0: 00000000 00000000 00000000 00000000 r10:829189c0 r9:ed211d84 r8:00000002 r7:60000013 r6:ed211d8c r5:8536ec00 r5:8536ec00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed211e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8536ec00 r8:85b5382c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:718:6812 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:718 state:D stack:0 pid:6812 tgid:6812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed21dd84 r8:00000002 r7:60000113 r6:ed21dd8c r5:8536b000 r4:8536b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8536b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed21de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b54a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8536b000 r7:00000000 r6:83018000 r5:00001000 r4:7f1df000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecefb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85badb8c r4:85bad800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85badb8c r4:85b53900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8536b000 r8:85b5392c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b53900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b53900 r8:8027ecf4 r7:ed211e60 r6:85b53980 r5:8536b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06cdd20 to 0xe06cdd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed221d84 r8:00000002 r7:60000113 r6:ed221d8c r5:83ad8000 r4:83ad8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed221e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3a500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ad8000 r7:00000000 r6:83018000 r5:00001000 r4:7f1ef000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed02f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85baeb8c r4:85bae800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85baeb8c r4:85b53a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad8000 r8:85b53a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b53a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b53a00 r8:8027ecf4 r7:ed211e60 r6:85b53a80 r5:83ad8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed221fb0 to 0xed221ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b54ac0 INFO: task kworker/0:719:6814 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: da2aa000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:83ad8c00 r4:829189bc r4:00000000 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:83ad8c00 r8:85b53b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:721:6818 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:721 state:D stack:0 pid:6818 tgid:6818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed219d84 r8:00000002 r7:60000113 r6:ed219d8c r5:83ad9800 r4:83ad9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed219e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b54e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ad9800 r7:00000000 r6:83018000 r5:00001000 r4:7f1ed000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed019000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bae78c r4:85bae400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bae78c r4:85b53c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad9800 r8:85b53c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b53c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b53c00 r8:8027ecf4 r7:ed221e60 r6:85b53c80 r5:83ad9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed219fb0 to 0xed219ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b54dc0 INFO: task kworker/0:721:6818 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dac3a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:83ada400 r4:829189bc r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:83ada400 r8:85b53d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dac3a000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:723:6822 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:723 state:D stack:0 pid:6822 tgid:6822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed22dd84 r8:00000002 r7:60000113 r6:ed22dd8c r5:83adb000 r4:83adb000 r5:83adb000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed22de08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85b53e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b53e00 r8:8027ecf4 r7:ed229e60 r6:85b53e80 r5:83adb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed22dfb0 to 0xed22dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85104100 INFO: task kworker/0:723:6822 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: db002000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r4:85004e00 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r4:8501e100 task:kworker/0:724 state:D stack:0 pid:6824 tgid:6824 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:83adbc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed231fb0 to 0xed231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85104200 INFO: task kworker/0:724:6824 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: db002000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:725:6826 blocked for more than 478 seconds. task:kworker/0:725 state:D stack:0 pid:6826 tgid:6826 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:83adc800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85bafb8c r4:85baf800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:725:6826 is blocked on a mutex likely owned by task kworker/1:290:3848. r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:83add400 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85104780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83add400 r7:00000000 r6:83018000 r5:00001000 r4:7f1f9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85baff8c r4:85bafc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85baff8c r4:85465100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83add400 r8:8546512c r7:82804d40 r6:dddced40 r5:dddced60 r4:85465100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465100 r8:8027ecf4 r7:ed239e60 r6:85465180 r5:83add400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed23dfb0 to 0xed23dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85104500 INFO: task kworker/0:726:6828 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: db7a8000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r4:85004e00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/0:727 state:D stack:0 pid:6829 tgid:6829 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:83ade000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed235e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:83adec00 r5:83adec00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed241e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85104a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83adec00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9cd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bb878c r4:85bb8400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bb878c r4:85465300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83adec00 r8:8546532c r7:82804d40 r6:dddced40 r5:dddced60 r4:85465300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465300 r8:8027ecf4 r7:ed235e60 r6:85465380 r5:83adec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed241fb0 to 0xed241ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85104800 INFO: task kworker/0:728:6832 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: db83d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:729:6834 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:729 state:D stack:0 pid:6834 tgid:6834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed255d84 r8:00000002 r7:60000013 r6:ed255d8c r5:85be8000 r4:85be8000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85be8000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed255e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85104ac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85be8000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba53000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bb8b8c r4:85bb8800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bb8b8c r4:85465400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85be8000 r8:8546542c r7:82804d40 r6:dddced40 r5:dddced60 r4:85465400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465400 r8:8027ecf4 r7:ed241e60 r6:85465480 r5:85be8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed255fb0 to 0xed255ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 800f0113 ffffffff r4:e06cddc0 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed249d84 r8:00000002 r7:60000113 r6:ed249d8c r5:85be9800 r4:85be9800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85be9800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed249e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85104d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdf1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bb8f8c r4:85bb8c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bb8f8c r4:85465500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85be9800 r8:8546552c r7:82804d40 r6:dddced40 r5:dddced60 r4:85465500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465500 r8:8027ecf4 r7:ed255e60 r6:85465580 r5:85be9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed249fb0 to 0xed249ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85104b00 INFO: task kworker/0:730:6836 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dbe72000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85beb000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed25de08 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85beb000 r8:8546562c r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:731:6838 is blocked on a mutex likely owned by task kworker/1:290:3848. [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:732:6840 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:732 state:D stack:0 pid:6840 tgid:6840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed261d84 r8:00000002 r7:60000013 r6:ed261d8c r5:85b6bc00 r4:85b6bc00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b6bc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed261e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b47f80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b6bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec835000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bb938c r4:85bb9000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bb938c r4:85465700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b6bc00 r8:8546572c r7:82804d40 r6:dddced40 r5:dddced60 r4:85465700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465700 r8:8027ecf4 r7:ed25de60 r6:85b3c380 r5:85b6bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed261fb0 to 0xed261ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85104bc0 INFO: task kworker/0:732:6840 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dc1c3000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:733 state:D stack:0 pid:6842 tgid:6842 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85b6ec00 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85465780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 800f0113 ffffffff r4:00000000 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8501e100 Workqueue: events bpf_prog_free_deferred r5:85b6e000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b6e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca71000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bb9f8c r4:85bb9c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bb9f8c r4:85465880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b6e000 r8:854658ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85465880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465880 r8:8027ecf4 r7:ed269e60 r6:85b3c480 r5:85b6e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed271fb0 to 0xed271ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84533140 INFO: task kworker/0:734:6844 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dc4b3000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:735:6846 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:735 state:D stack:0 pid:6846 tgid:6846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed279d84 r8:00000002 r7:60000113 r6:ed279d8c r5:85360000 r4:85360000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85360000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed279e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84533480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85360000 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecacb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bba38c r4:85bba000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bba38c r4:85465800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85360000 r8:8546582c r7:82804d40 r6:dddced40 r5:dddced60 r4:85465800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465800 r8:8027ecf4 r7:ed271e60 r6:85b3c500 r5:85360000 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85360c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dc8b2000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:737:6849 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:737 state:D stack:0 pid:6849 tgid:6849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed285d84 r8:00000002 r7:60000013 r6:ed285d8c r5:85362400 r4:85362400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85362400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed285e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84533580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85362400 r7:00000000 r6:83018000 r5:00001000 r4:7f11d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc0d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bba78c r4:85bba400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bba78c r4:85465980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85362400 r8:854659ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85465980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465980 r8:8027ecf4 r7:ed27de60 r6:85b3c600 r5:85362400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed285fb0 to 0xed285ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84533440 INFO: task kworker/0:737:6849 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dc8b2000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:738:6851 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:738 state:D stack:0 pid:6851 tgid:6851 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed259d84 r8:00000002 r7:60000113 r6:ed259d8c r5:85363000 r4:85363000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85363000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed259e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84533a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85363000 r7:00000000 r6:83018000 r5:00001000 r4:7f181000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece23000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bbaf8c r4:85bbac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bbaf8c r4:85465a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85363000 r8:85465a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85465a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465a00 r8:8027ecf4 r7:ed27de60 r6:85b3c680 r5:85363000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed259fb0 to 0xed259ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dca62000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:739:6858 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:739 state:D stack:0 pid:6858 tgid:6858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed281d84 r8:00000002 r7:60000013 r6:ed281d8c r5:85363c00 r4:85363c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85363c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed281e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84533c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85363c00 r7:00000000 r6:83018000 r5:00001000 r4:7f185000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece55000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bbb38c r4:85bbb000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bbb38c r4:85465a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85363c00 r8:85465aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85465a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465a80 r8:8027ecf4 r7:ed259e60 r6:85b3c700 r5:85363c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed281fb0 to 0xed281ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84533a40 INFO: task kworker/0:739:6858 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dcdd7000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:740 state:D stack:0 pid:6860 tgid:6860 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85364800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed265e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:741:6861 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:741 state:D stack:0 pid:6861 tgid:6861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed291d84 r8:00000002 r7:60000113 r6:ed291d8c r5:85365400 r4:85365400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85365400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed291e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84533d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85365400 r7:00000000 r6:83018000 r5:00001000 r4:7f187000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece7f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bbb78c r4:85bbb400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bbb78c r4:85465b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85365400 r8:85465bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85465b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465b80 r8:8027ecf4 r7:ed265e60 r6:85b3c800 r5:85365400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed291fb0 to 0xed291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84533d80 INFO: task kworker/0:741:6861 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dd34f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85366c00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed299e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85366c00 r8:85465c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84533d80 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85b6b000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf51000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc038c r4:85bc0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc038c r4:85465c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b6b000 r8:85465cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85465c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465c80 r8:8027ecf4 r7:ed299e60 r6:85b3c900 r5:85b6b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2a1fb0 to 0xed2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84533f00 INFO: task kworker/0:743:6866 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dd7c4000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:744:6868 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:744 state:D stack:0 pid:6868 tgid:6868 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed2a9d84 r8:00000002 r7:60000013 r6:ed2a9d8c r5:85361800 r4:85361800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85361800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2a9e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e540 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85361800 r8:85465d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85465d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465d00 r8:8027ecf4 r7:ed2a1e60 r6:85b3c980 r5:85361800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2a9fb0 to 0xed2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8520e080 INFO: task kworker/0:744:6868 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ddc0f000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 Exception stack(0xe06cdfb0 to 0xe06cdff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85366000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2ade08 r4:00000000 [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85bc078c r4:85bc0400 r10:61c88647 r9:85366000 r8:85465dac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06cdd20 to 0xe06cdd68) r4:e06cddc0 r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:746 state:D stack:0 pid:6871 tgid:6871 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85b70c00 r4:829189bc r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: ddf81000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:747:6873 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:747 state:D stack:0 pid:6873 tgid:6873 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed2bdd84 r8:00000002 r7:60000113 r6:ed2bdd8c r5:85b70000 r4:85b70000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b70000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2bde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b70000 r7:00000000 r6:83018000 r5:00001000 r4:7f19f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc0f8c r4:85bc0c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc0f8c r4:85465e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b70000 r8:85465eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85465e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465e80 r8:8027ecf4 r7:ed2a9e60 r6:85b3cb00 r5:85b70000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2bdfb0 to 0xed2bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8520e180 INFO: task kworker/0:747:6873 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: de259000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:748:6875 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:748 state:D stack:0 pid:6875 tgid:6875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed2c5d84 r8:00000002 r7:60000013 r6:ed2c5d8c r5:85b71800 r4:85b71800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b71800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2c5e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b71800 r7:00000000 r6:83018000 r5:00001000 r4:7f1a1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfb3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc138c r4:85bc1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc138c r4:85465f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b71800 r8:85465f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85465f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465f00 r8:8027ecf4 r7:ed2a9e60 r6:85b3cb80 r5:85b71800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2c5fb0 to 0xed2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8520e5c0 INFO: task kworker/0:748:6875 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: de259000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:749:6878 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:749 state:D stack:0 pid:6878 tgid:6878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed2cdd84 r8:00000002 r7:60000013 r6:ed2cdd8c r5:85b73000 r4:85b73000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b73000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2cde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520eb00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b73000 r7:00000000 r6:83018000 r5:00001000 r4:7f1cf000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed251000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc278c r4:85bc2400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc278c r4:85465f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b73000 r8:85465fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85465f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85465f80 r8:8027ecf4 r7:ed2a9e60 r6:85b3cc00 r5:85b73000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2cdfb0 to 0xed2cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8520e440 INFO: task kworker/0:749:6878 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: de4fe000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:750:6880 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:750 state:D stack:0 pid:6880 tgid:6880 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed2d1d84 r8:00000002 r7:60000013 r6:ed2d1d8c r5:85b72400 r4:85b72400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b72400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85b72400 r8:8551802c r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501e100 Call trace: r5:85b74800 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85518080 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:751:6882 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dea6d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:752:6887 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:752 state:D stack:0 pid:6887 tgid:6887 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85b75400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r4:e06cddc0 r5:00001000 r4:dfd83000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:753:6889 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:753 state:D stack:0 pid:6889 tgid:6889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed2ddd84 r8:00000002 r7:60000013 r6:ed2ddd8c r5:85b76c00 r4:85b76c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b76c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2dde08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520ec40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b76c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1d1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2df000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc2b8c r4:85bc2800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc2b8c r4:85518180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b76c00 r8:855181ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85518180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85518180 r8:8027ecf4 r7:ed2cde60 r6:85b3ce00 r5:85b76c00 dfa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:754 state:D stack:0 pid:6891 tgid:6891 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85bed400 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2d9e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85bed400 r8:8551822c r7:82804d40 r6:dddced40 r5:dddced60 r4:8520ec80 Call trace: dd60: 800f0113 ffffffff r4:e06cddc0 r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85bee000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2fde08 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85bee000 r7:00000000 r6:83018000 r5:00001000 r4:7f1d5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2ef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc2f8c r4:85bc2c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc2f8c r4:85518300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bee000 r8:8551832c r7:82804d40 r6:dddced40 r5:dddced60 r4:85518300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85518300 r8:8027ecf4 r7:ed2d9e60 r6:85518380 r5:85bee000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2fdfb0 to 0xed2fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8520ee40 INFO: task kworker/0:755:6894 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: df6f6000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:756:6896 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:756 state:D stack:0 pid:6896 tgid:6896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed30dd84 r8:00000002 r7:60000113 r6:ed30dd8c r5:85bea400 r4:85bea400 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bea400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed30de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84533f00 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc338c r4:85bc3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc338c r4:85518400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bea400 r8:8551842c r7:82804d40 r6:dddced40 r5:dddced60 r4:85518400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85518400 r8:8027ecf4 r7:ed2d9e60 r6:85518480 r5:85bea400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed30dfb0 to 0xed30dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8520e800 INFO: task kworker/0:756:6896 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: df6f6000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:757 state:D stack:0 pid:6899 tgid:6899 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed055d84 r8:00000002 r7:60000113 r6:ed055d8c r5:85bec800 r4:85bec800 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bec800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed055e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855171c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85bec800 r7:00000000 r6:83018000 r5:00001000 r4:7f1fd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed305000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85bec800 r8:8551852c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe06cdd20 to 0xe06cdd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85bebc00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85517500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85bebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc3f8c r4:85bc3c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc3f8c r4:85518600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bebc00 r8:8551862c r7:82804d40 r6:dddced40 r5:dddced60 r4:85518600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85518600 r8:8027ecf4 r7:ed2d9e60 r6:85518680 r5:85bebc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed309fb0 to 0xed309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85517640 INFO: task kworker/0:758:6904 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: df8fd000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfd83000 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 r4:85004e00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85be8c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:85bc438c r4:85bc4000 r10:61c88647 r9:85be8c00 r8:8551872c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:760:6906 blocked for more than 479 seconds. r5:85beec00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85518800 r8:8027ecf4 r7:ed295e60 r6:85518880 r5:85beec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed319fb0 to 0xed319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85517640 INFO: task kworker/0:760:6906 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: dffb6000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:761:6907 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:761 state:D stack:0 pid:6907 tgid:6907 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed31dd84 r8:00000002 r7:60000013 r6:ed31dd8c r5:85490000 r4:85490000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85490000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed31de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8df00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85490000 r7:00000000 r6:83018000 r5:00001000 r4:7f203000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec83d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85518900 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: e041d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:85490c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed315e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85490c00 r8:85518a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85517e40 Call trace: dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85492400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8d900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:764:6984 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:764 state:D stack:0 pid:6984 tgid:6984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed405d84 r8:00000002 r7:60000013 r6:ed405d8c r5:85496c00 r4:85496c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85496c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed405e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8da40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85496c00 r7:00000000 r6:83018000 r5:00001000 r4:7f205000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc5f8c r4:85bc5c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc5f8c r4:85518c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85496c00 r8:85518c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85518c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85518c00 r8:8027ecf4 r7:ed345e60 r6:85518c80 r5:85496c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed405fb0 to 0xed405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a8de80 INFO: task kworker/0:764:6984 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: e081b000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85494800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85494800 r7:00000000 r6:83018000 r5:00001000 r4:7f20b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecab1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc6b8c r4:85bc6800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc6b8c r4:85518d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85494800 r8:85518d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85518d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85518d00 r8:8027ecf4 r7:ed345e60 r6:85518d80 r5:85494800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 dd60: 800f0113 ffffffff r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 Not tainted 6.15.0-syzkaller #0 r5:85496000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85517c00 r5:85bc678c r4:85bc6400 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:767:6991 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:767 state:D stack:0 pid:6991 tgid:6991 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed42dd84 r8:00000002 r7:60000113 r6:ed42dd8c r5:85493000 r4:85493000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85493000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed42de08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6e200 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85493000 r7:00000000 r6:83018000 r5:00001000 r4:7f20d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb37000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc6f8c r4:85bc6c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc6f8c r4:85518f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85493000 r8:85518f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85518f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85518f00 r8:8027ecf4 r7:ed425e60 r6:85518f80 r5:85493000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed42dfb0 to 0xed42dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a6e0c0 INFO: task kworker/0:767:6991 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 dd20: e0e37000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:768 state:D stack:0 pid:6993 tgid:6993 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85493c00 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6e2c0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb73000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc738c r4:85bc7000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85bc738c r4:85a73000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85493c00 r8:85a7302c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a73000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a73000 r8:8027ecf4 r7:ed42de60 r6:85a73080 r5:85493c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed435fb0 to 0xed435ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a6e1c0 INFO: task kworker/0:768:6993 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: e1232000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:8501e100 Workqueue: events bpf_prog_free_deferred r5:85491800 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:85bc778c r4:85a73100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85491800 r8:85a7312c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a73100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a73100 r8:8027ecf4 r7:ed435e60 r6:85a73180 r5:85491800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed439fb0 to 0xed439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a6e300 INFO: task kworker/0:769:6995 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:e06cddc0 r4:00000000 r5:84ff7f8c r4:84ff7c00 r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 INFO: task kworker/0:770:6998 blocked for more than 479 seconds. r5:85495400 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85bc7b8c r4:85bc7800 r10:00000000 r9:85a73200 r8:8027ecf4 r7:ed439e60 r6:85a73280 r5:85495400 INFO: task kworker/0:770:6998 is blocked on a mutex likely owned by task kworker/1:290:3848. [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501e100 task:kworker/0:771 state:D stack:0 pid:7000 tgid:7000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed431d84 r8:00000002 r7:60000013 r6:ed431d8c r5:85410c00 r4:85410c00 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85410c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed431e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a6eb00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85410c00 r7:00000000 r6:83018000 r5:00001000 r4:7f21b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecce3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84c0eb8c r4:84c0e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c0eb8c r4:85a73300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85410c00 r8:85a7332c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a73300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a73300 r8:8027ecf4 r7:ed43de60 r6:85a73380 r5:85410c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed431fb0 to 0xed431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a6e580 INFO: task kworker/0:771:7000 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: e1b10000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b76000 r5:85b76000 r4:829189bc r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84c0ef8c r4:84c0ec00 r10:61c88647 r9:85b76000 r8:85a7342c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a6e580 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:773 state:D stack:0 pid:7005 tgid:7005 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85b78c00 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84c0e78c r4:84c0e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84c0e78c r4:85a73480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b78c00 r8:85a734ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a73480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a73480 r8:8027ecf4 r7:ed431e60 r6:85a83000 r5:85b78c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed451fb0 to 0xed451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85a6ebc0 INFO: task kworker/0:773:7005 is blocked on a mutex likely owned by task kworker/1:290:3848. task:kworker/1:290 state:R running task stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: e2033000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:dfd83000 r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8501e100 task:kworker/0:774 state:D stack:0 pid:7007 tgid:7007 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85b78000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: e264d000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:775:7008 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:775 state:D stack:0 pid:7008 tgid:7008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829189c0 r9:ed449d84 r8:00000002 r7:60000113 r6:ed449d8c r5:85410000 r5:85410000 r4:829189bc [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:85a73580 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:776 state:D stack:0 pid:7011 tgid:7011 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85412400 r4:829189bc r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:85078c00 r8:80200be4 r7:e06cdd54 r6:ffffffff r5:85078c00 r4:00000000 [<81a67234>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06cdd20 to 0xe06cdd68) dd20: e28d0000 eda4b000 00000001 80239b98 7f283000 00000001 82ac11c4 82ac05a0 dd40: 7f283000 eda4b000 8280c9b4 e06cdd9c e06cdda0 e06cdd70 80230ad4 80239bb0 dd60: 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06cddc0 r5:e06cde08 r4:e06cddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ff7f8c r4:84ff7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ff7f8c r4:85004e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:85004e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85004e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85004e00 r8:8027ecf4 r7:e06b9e60 r6:85004e80 r5:85078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:777:7012 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:777 state:D stack:0 pid:7012 tgid:7012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed441d84 r8:00000002 r7:60000113 r6:ed441d8c r5:85413000 r4:85413000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85413000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed441e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a93000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a67274>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e06cddc0 r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r4:85004e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85413c00 r4:829189bc r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85c68f8c r4:85a73880 Exception stack(0xed461fb0 to 0xed461ff8) Workqueue: events bpf_prog_free_deferred dd60: 800f0113 ffffffff r4:e06cddc0 r5:00001000 r4:dfd83000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8501e100 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65eb8>] (__schedule) from [<81a66e40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65eb8>] (__schedule) from [<81a66e40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed471d84 r8:00000002 r7:60000013 r6:ed471d8c r5:85b7b000 r4:85b7b000 [<81a66e14>] (schedule) from [<81a67228>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b7b000 r4:829189bc [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a67210>] (schedule_preempt_disabled) from [<81a6990c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6960c>] (__mutex_lock.constprop.0) from [<81a69dd8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed471e08 r4:00000000 [<81a69dc4>] (__mutex_lock_slowpath) from [<81a69e18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69ddc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a93280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85b7b000 r7:00000000 r6:83018000 r5:00001000 r4:7f22b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf99000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891)